Rapid7 Vulnerability & Exploit Database

pfSense: pfSense-SA-16_02.webgui: Multiple XSS and CSRF Vulnerabilities in the pfSense WebGUI

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

pfSense: pfSense-SA-16_02.webgui: Multiple XSS and CSRF Vulnerabilities in the pfSense WebGUI

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
04/01/2016
Created
07/25/2018
Added
08/25/2017
Modified
02/20/2020

Description

Multiple Cross-Site Scripting (XSS) vulnerabilities were found in the pfSense WebGUI on pfSense 2.2.6 and earlier versions. On system_gateway_groups_edit.php, a gateway Description ("descr") was being printed without encoding, leading to a potential stored XSS. Multiple limiter parameters referenced on firewall_shaper_vinterface.php on pfSense 2.2.6 and earlier were printed without encoding when rejected by input validation, leading to a reflected XSS. The redesigned GUI used on pfSense 2.3 is not affected. The "container" parameter referenced on firewall_shaper_layer7.php on pfSense 2.2.6 and earleir was printed without encoding when rejected by input validation, leading to a reflected XSS. The Layer 7 feature is deprecated and had already been removed from the master branch (2.3), thus it is not affected. Due to the lack of proper encoding on the affected variables and pages, arbitrary JavaScript can be executed in the user's browser. The user's session cookie or other information from the session may be compromised.

Solution(s)

  • pfsense-upgrade-latest

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;