pfsense 2.3.2 Code Execution Vulnerability

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### **Overview** pfsense is an open source firewall. The web interface is written in PHP. In version 2.3.2-RELEASE (amd64), the setup wizard is vulnerable to code execution. It should be noted that by default, only an administrator can access the setup wizard. By default, administrators have far-reaching permissions via the wizard and via other functionality. There are however some custom configurations where this vulnerability could lead to privilege escalation or undesired code execution. Unknown to us, this issue was previously discussed on the [github page of opnsense](https://github.com/opnsense/core/issues/1359) - a fork of pfsense - , although it was not classified as a vulnerability. ### **Details** CVSS: Medium; 6.8 https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H When updating a config field, user input is passed to eval. For most config types the input is sanitized. However, the sanitation can be bypassed and there is no sanitation...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息