Rapid7 Vulnerability & Exploit Database

pfSense: pfSense-SA-19_06.webgui: Authenticated Arbitrary Code Execution in the WebGUI

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

pfSense: pfSense-SA-19_06.webgui: Authenticated Arbitrary Code Execution in the WebGUI

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
05/20/2019
Created
05/22/2019
Added
05/21/2019
Modified
02/20/2020

Description

The OpenVPN server (vpn_openvpn_server.php), client (vpn_openvpn_client.php), and client-specific override (vpn_openvpn_csc.php) pages on pfSense allow authenticated administrators to enter custom advanced options which are passed through as-is to the OpenVPN configuration file. These parameters can include directives such as "up" which are able to run arbitrary binaries when specific events occur in OpenVPN. Allowing these advanced parameters is an intended feature. However, an administrator may not expect that by allowing a lower-privilege user access to these pages that the lower-privilege user may use the advanced options to execute arbitrary code. An authenticated user granted access to these pages via their associated privileges, either directly or via group membership, could leverage these directives to gain elevated privileges and make arbitrary changes to the firewall.

Solution(s)

  • pfsense-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;