Rapid7 Vulnerability & Exploit Database

pfSense: pfSense-SA-18_05.webgui: XSS vulnerability in the WebGUI

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

pfSense: pfSense-SA-18_05.webgui: XSS vulnerability in the WebGUI

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
05/01/2018
Created
07/25/2018
Added
05/15/2018
Modified
01/30/2020

Description

A Cross-Site Scripting (XSS) vulnerability was found in pkg_mgr_install.php, a part of the pfSense software WebGUI, on version 2.4.3 and earlier. On pkg_mgr_install.php, the value of the output parameter was not validated nor encoded before being printed to the user, which could be used as an XSS vector. Due to the lack of proper encoding on the affected variable susceptible to XSS, arbitrary JavaScript can be executed in the user's browser. The user's session cookie or other information from the session may be compromised. Due to the fact that this can only be exploited via custom POST data submitted by an authenticated user with a valid CSRF token, the impact is lower than most similar issues.

Solution(s)

  • pfsense-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;