vendor:
IPFire
by:
Mücahit Saratar
8.8
CVSS
HIGH
Remote Code Execution
94
CWE
Product Name: IPFire
Affected Version From: 2.25
Affected Version To: 2.25
Patch Exists: YES
Related CWE: CVE-2021-33393
CPE: 2.25:core_update_156
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/http/ipfire_pakfire_exec, https://www.infosecmatter.com/nessus-plugin-library/?id=33424, https://www.infosecmatter.com/nessus-plugin-library/?id=33491, https://www.infosecmatter.com/nessus-plugin-library/?id=33571, https://www.infosecmatter.com/nessus-plugin-library/?id=33567, https://www.infosecmatter.com/nessus-plugin-library/?id=33741, https://www.infosecmatter.com/nessus-plugin-library/?id=33400, https://www.infosecmatter.com/nessus-plugin-library/?id=33423, https://www.infosecmatter.com/nessus-plugin-library/?id=67714, https://www.infosecmatter.com/nessus-plugin-library/?id=43702
Platforms Tested: Parrot OS 5.7.0-2parrot2-amd64
2021
IPFire 2.25 – Remote Code Execution (Authenticated)
A vulnerability in IPFire 2.25 allows an authenticated user to execute arbitrary code on the target system. This is due to the lack of proper input validation in the 'pakfire.cgi' script, which allows an attacker to inject malicious code into the 'INSPAKS' parameter. This can be exploited by sending a specially crafted HTTP POST request to the vulnerable script.
Mitigation:
Upgrade to the latest version of IPFire 2.25.