Rapid7 Vulnerability & Exploit Database

pfSense: pfSense-SA-21_01.webgui: XSS vulnerability in the WebGUI

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

pfSense: pfSense-SA-21_01.webgui: XSS vulnerability in the WebGUI

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
03/03/2021
Created
04/15/2021
Added
04/15/2021
Modified
04/16/2021

Description

A stored Cross-Site Scripting (XSS) vulnerability was found in services_wol.php, a component of the pfSense CE and pfSense Plus software WebGUI, on pfSense CE version 2.5.0, pfSense Plus version 21.02-p1, and earlier versions of both. The page did not validate the contents of the Description field for Wake on LAN entries, nor did it encode the output when using the "Wake All Devices" function which prints this value, leading to a possible XSS. Due to the lack of proper encoding on the affected parameters susceptible to XSS, arbitrary JavaScript could be executed in the user's browser. The user's session cookie or other information from the session may be compromised.

Solution(s)

  • pfsense-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;