what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

pfsense 2.3.2 Cross Site Scripting

pfsense 2.3.2 Cross Site Scripting
Posted Mar 27, 2017
Authored by Tim Coen | Site curesec.com

pfsense version 2.3.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5265038acc564a91f8f3566357f7cc4c9a1e67a7ebda312a77ce2ab48ec2ffdd

pfsense 2.3.2 Cross Site Scripting

Change Mirror Download
Security Advisory - Curesec Research Team

1. Introduction

Affected Product: pfsense 2.3.2
Fixed in: 2.3.3
Fixed Version Link: https://pfsense.org/download/
Vendor Website: https://www.pfsense.org/
Vulnerability Type: XSS
Remote Exploitable: Yes
Reported to vendor: 02/06/2017
Disclosed to public: 03/24/2017
Release mode: Coordinated Release
CVE: requested via DWF
Credits Tim Coen of Curesec GmbH

2. Overview

pfsense is an open source firewall. The web interface is written in PHP. In
version 2.3.2-RELEASE (amd64), it is vulnerable to reflected XSS. XSS can lead
to disclosure of cookies, session tokens etc.

3. Details

XSS 1

CVSS: Medium; 6.1 https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/
PR:N/UI:R/S:C/C:L/I:L/A:N

Description: When performing a package reinstall via the package manager, the
"from" and "to" parameter are vulnerable to reflected XSS.

Proof of Concept:

http://192.168.178.60/pkg_mgr_install.php?mode=reinstallpkg&pkg=
pfSense-pkg-arping&from='"><img src=no onerror=alert(1)>&to='"><img src=no
onerror=alert(1)>

Note that while the "pkg" parameter must be a valid package, it does not need
to actually be installed on the system.

Code:

pkg_mgr_install.php <?=sprintf(gettext('Confirmation Required to upgrade
package %1$s from %2$s to %3$s.'), $pkgname, $_GET['from'], $_GET['to'])?>

XSS 2

CVSS: Medium; 4.7 https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/
PR:N/UI:R/S:C/C:L/I:L/A:N

Description: The pkg_filter Parameter of the pkg.php file is vulnerable to
reflected XSS. It should be noted that the xml Parameter must point to an
existing xml file, which must contain a field with the type sorting and the
include_filtering_inputbox tag set. According to the vendor, the FreeRADIUS
package is affected.

Proof of Concept:

192.168.10.150/pkg.php?xml=miniupnpd.xml&pkg_filter='"><img src=no onerror=
alert(1)>

Code:

pkg.php echo " Filter text: <input id='pkg_filter' name='pkg_filter' value='"
. $_REQUEST['pkg_filter'] . "' /> <input type='submit' value='Filter' />";

4. Solution

To mitigate this issue please upgrade at least to version 2.3.3:

https://pfsense.org/download/

Please note that a newer version might already be available.

5. Report Timeline

02/06/2017 Informed Vendor about Issue
02/07/2017 Vendor confirms + fixes issues in git
02/20/2017 Vendor relases fix + vendor advisory
03/24/2017 Disclosed to public


Blog Reference:
https://www.curesec.com/blog/article/blog/pfsense-232-XSS-197.html

--
blog: https://www.curesec.com/blog
Atom Feed: https://www.curesec.com/blog/feed.xml
RSS Feed: https://www.curesec.com/blog/rss.xml
tweet: https://twitter.com/curesec

Curesec GmbH
Curesec Research Team
Josef-Orlopp-StraAe 54
10365 Berlin, Germany


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close