Multiple Cross-Site Scripting (XSS) vulnerabilities and one CSRF issue were found in the pfSense software WebGUI on version 2.3.2_1 and earlier. On pkg_mgr_install.php, the "from" and "to" parameter are vulnerable to reflected XSS when performing a reinstall action. On pkg.php, the "pkg_filter" parameter is vulnerable to reflected XSS when a package XML file contains a field type of "sorting" which also has "include_filtering_inputbox" active. Currently the only affected package is FreeRADIUS ( freeradius.xml and freeradiusauthorizedmacs.xml both meet these conditions ). The easyrule.php script uses GET variables to, making it possible to add new firewall rules via CSRF. Due to the lack of proper encoding on the affected variables and pages succeptible to XSS, arbitrary JavaScript can be executed in the user's browser. The user's session cookie or other information from the session may be compromised. Due to the use of GET on easyrule.php, a firewall administrator could unknowingly create an unwanted firewall rule if they are the victim of a CSRF attack.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center