vendor:
pfSense
by:
IHTeam
9.8
CVSS
CRITICAL
Remote Code Execution (RCE)
78
CWE
Product Name: pfSense
Affected Version From: 2.1.4_26
Affected Version To: 2.1.4_26
Patch Exists: YES
Related CWE: CVE-2022-31814
CPE: a:netgate:pfsense:2.1.4_26
Tags: packetstorm,cve,cve2022,pfsense,pfblockerng,rce,oast
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://www.ihteam.net/advisory/pfblockerng-unauth-rce-vulnerability/, https://docs.netgate.com/pfsense/en/latest/packages/pfblocker.html, https://github.com/EvergreenCartoons/SenselessViolence, https://nvd.nist.gov/vuln/detail/CVE-2022-31814, http://packetstormsecurity.com/files/171123/pfBlockerNG-2.1.4_26-Remote-Code-Execution.html
Nuclei Metadata: {'max-request': 2, 'verified': True, 'framework': 'pfsense', 'vendor': 'netgate', 'product': 'pfblockerng'}
Platforms Tested: pfSense 2.6.0
2022
pfBlockerNG 2.1.4_26 – Remote Code Execution (RCE)
pfBlockerNG is a package for pfSense which provides the ability to extend the firewall rule set to provide more granular filtering. A vulnerability exists in pfBlockerNG version 2.1.4_26 which allows an unauthenticated attacker to execute arbitrary code on the vulnerable system. This is due to the lack of input validation in the Host header of the index.php page. An attacker can craft a malicious Host header which will execute arbitrary code on the vulnerable system.
Mitigation:
Upgrade to the latest version of pfBlockerNG.