vendor:
pfsense
by:
Nassim Asrir
8.8
CVSS
HIGH
Remote Code Injection
78
CWE
Product Name: pfsense
Affected Version From: 2.3.4
Affected Version To: 2.4.4-p3
Patch Exists: YES
Related CWE: CVE-2019-16701
CPE: a:pfsense:pfsense
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 10(64bit) | Pfsense 2.3.4 / 2.4.4-p3
2018
Pfsense 2.3.4 / 2.4.4-p3 – Remote Code Injection
The pfsense allow users (uid=0) to make remote procedure calls over HTTP (XMLRPC) and the XMLRPC contain some critical methods which allow any authenticated user/hacker to execute OS commands. As we see in the output we have two interesting methods: pfsense.exec_shell and pfsense.exec_php. In the static analysis we will analysis the xmlrpc.php file. This code check if the user have enough privileges. As we can see, first we have a check for auth tpken and then we have a check for the method name.
Mitigation:
Ensure that authentication tokens are properly validated and that only authorized methods are allowed.