Rapid7 Vulnerability & Exploit Database

pfSense: pfSense-SA-19_07.webgui: Privilege Escalation in the WebGUI

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

pfSense: pfSense-SA-19_07.webgui: Privilege Escalation in the WebGUI

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
05/20/2019
Created
05/22/2019
Added
05/21/2019
Modified
02/20/2020

Description

The privileges for access to the dashboard (page-dashboard-all) and for direct access to dashboard widgets (page-dashboard-widgets) contained a match clause for widget files with a leading wildcard. This allowed the URL to be manipulated in a way which could have been used to gain elevated privileges. Authenticated users with these privileges could access pages for which they had not been granted access by appending a string to the URL ending in ".widget.php", for example: https://x.x.x.x/diag_backup.php?a.widget.php Authenticated users could have used this behavior to gain elevated privileges and perform actions allowed by any page in the WebGUI.

Solution(s)

  • pfsense-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;