pfSense pfBlockerNG through 2.1.4_26 allows remote attackers to execute arbitrary OS commands as root via shell metacharacters in the HTTP Host header. NOTE: 3.x is unaffected.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://docs.netgate.com/pfsense/en/latest/packages/pfblocker.html | release notes vendor advisory |
https://www.ihteam.net/advisory/pfblockerng-unauth-rce-vulnerability/ | exploit third party advisory technical description |
http://packetstormsecurity.com/files/168743/pfSense-pfBlockerNG-2.1.4_26-Shell-Upload.html | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/171123/pfBlockerNG-2.1.4_26-Remote-Code-Execution.html | |
https://github.com/pfsense/FreeBSD-ports/pull/1169 | |
https://github.com/pfsense/FreeBSD-ports/pull/1169/commits/071bdcf2d918c3e51cde11cf81fbd9b6f0379d7e |