Description
Multiple directory traversal vulnerabilities in BarracudaDrive Web Server before 3.8 allow (1) remote attackers to read arbitrary files via certain ..\ (dot dot backslash) sequences in the URL path, or (2) remote authenticated users to delete arbitrary files or create arbitrary directories via a ..\ (dot dot backslash) sequence in the dir parameter to /drive/c/bdusers/USER/.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Luigi Auriemma · textremotewindows
https://www.exploit-db.com/exploits/4713
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/484833/100/0/threaded
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/28032
Exploit x_refsource_misc
http://aluigi.altervista.org/adv/barradrive-adv.txt
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/3434
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/26805
Scores
EPSS
0.0622
EPSS Percentile
90.9%
Details
CWE
CWE-22
Status
published
Products (2)
real_time_logic/barracudadrive_web_server
3.7.2
real_time_logic/barracudadrive_web_server_home_server
3.7.2
Published
Dec 12, 2007
Tracked Since
Feb 18, 2026