A Stored Cross-Site Scripting (XSS) vulnerability was found in status_filter_reload.php, a page in the pfSense software WebGUI, on Netgate pfSense version 2.4.4-p2 and earlier. The page did not encode output from the filter reload process, and a stored XSS was possible via the descr (description) parameter on NAT rules.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.pfsense.org/download/ | vendor advisory |
https://docs.netgate.com/pfsense/en/latest/releases/2-4-4-p3.html | product vendor advisory |
https://gist.github.com/dharmeshbaskaran/fd3779006361d07651a883e8a040d916 | third party advisory exploit |