pfSense before 2.3 allows remote authenticated users to execute arbitrary OS commands via a '|' character in the status_rrd_graph_img.php graph parameter, related to _rrd_graph_img.php.
References
Link | Resource |
---|---|
https://www.security-assessment.com/files/documents/advisory/pfsenseAdvisory.pdf | Exploit Third Party Advisory |
https://www.rapid7.com/db/modules/exploit/unix/http/pfsense_graph_injection_exec | Exploit Third Party Advisory |
https://www.pfsense.org/security/advisories/pfSense-SA-16_01.webgui.asc | Vendor Advisory |
https://www.exploit-db.com/exploits/39709/ | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-01-21 20:29
Updated : 2018-02-09 12:18
NVD link : CVE-2016-10709
Mitre link : CVE-2016-10709
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
pfsense
- pfsense