Command Injection Vulnerability in pfSense WebGUI
CVE-2018-16055

8.8HIGH

Key Information:

Vendor

Netgate

Status
Vendor
CVE Published:
26 September 2018

What is CVE-2018-16055?

An authenticated command injection vulnerability is present in the WebGUI of pfSense, specifically in the status_interfaces.php file. Due to improper handling of user input from the $_POST parameters 'ifdescr' and 'ipv', malicious users can execute arbitrary commands with root privileges by submitting a request intended to relinquish a DHCP lease. This issue affects pfSense versions prior to 2.4.4, highlighting the necessity for secure coding practices to handle user input correctly. Users of affected versions should prioritize updating to mitigate the risk of exploitation.

References

EPSS Score

10% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.