OS Command Injection in pfsense - CVE-2018-4020

 

OS Command Injection in pfsense - CVE-2018-4020

Published: December 3, 2018 / Updated: August 8, 2020


Vulnerability identifier: #VU36342
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2018-4020
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Rubicon Communications
Affected software:
pfsense

Detailed vulnerability description

The vulnerability allows a remote privileged user to execute arbitrary code.

An exploitable command injection vulnerability exists in the way Netgate pfSense CE 2.4.4-RELEASE processes the parameters of a specific POST request. The attacker can exploit this and gain the ability to execute arbitrary commands on the system. An attacker needs to be able to send authenticated POST requests to the administration web interface. Command injection is possible in the `powerd_ac_mode` POST parameter parameter.


How to mitigate CVE-2018-4020

Install update from vendor's website.

Sources