Rapid7 Vulnerability & Exploit Database

pfSense: pfSense-SA-19_08.webgui: Privilege Escalation in the WebGUI

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

pfSense: pfSense-SA-19_08.webgui: Privilege Escalation in the WebGUI

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
05/20/2019
Created
05/22/2019
Added
05/21/2019
Modified
02/20/2020

Description

When testing if a privilege matches a requested page, the path to the filename was not fully resolved before the check was performed. This allowed a directory traversal style attack to bypass privilege checks and gain elevated privileges. An authenticated user with access to a page in the WebGUI could have used a directory traversal style attack to access other pages for which they did not have access, gaining elevated privileges. For example, a user granted access to "a.php" could have gained access to "b.php" by submitting a request for "a.php/../b.php". The privilege system matched "a.php" but the WebGUI served "b.php" to the client. Note that most browsers and HTTP clients will not allow this type of URL, so attacks are limited to clients such as cURL (using --path-as-is) or special purpose proxies which allow these requests.

Solution(s)

  • pfsense-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;