跳转到帖子

pfSense: pfSense-SA-23_04.webgui: Authenticated Command Execution in the WebGUI

recommended_posts

发布于
  • Members

pfSense: pfSense-SA-23_04.webgui: Authenticated Command Execution in the WebGUI

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
02/15/2023
Created
02/17/2023
Added
02/16/2023
Modified
02/17/2023

Description

A potential authenticated arbitrary command execution vulnerability was found in status.php, a component of the pfSense Plus and pfSense CE software GUI. If there is a file named '/tmp/rules.packages.|<command>|.txt', then when an authenticated GUI user loads status.php, the GUI executes '<command>'. This problem is present on pfSense Plus version 22.05.1, pfSense CE version 2.6.0, and earlier versions of both. In combination with another bug that lets users write arbitrary files, a user with sufficient privileges to access status.php could run a command directly or trick another administrator with privileges into running a command. The commands which work here are of limited use as other characters which might make it more useful also make it fail to trigger. Furthermore, status.php is not linked in the GUI and is typically only run under direction of TAC, so opportunity for exploitation is fairly low.

Solution(s)

  • pfsense-upgrade-latest

References

  • https://docs.netgate.com/downloads/pfSense-SA-23_04.webgui.asc
  • https://docs.netgate.com/pfsense/en/latest/development/system-patches.html
  • https://docs.netgate.com/pfsense/en/latest/install/upgrade-guide.html
  • https://redmine.pfsense.org/issues/13426
  • 查看数 694
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…