A remote command execution vulnerability exists in IPFire before version 2.19 Core Update 101 via the 'proxy.cgi' CGI interface. An authenticated attacker can inject arbitrary shell commands through crafted values in the NCSA user creation form fields, leading to command execution with web server privileges.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.ipfire.org/news/ipfire-2-19-core-update-101-released | vendor advisory patch |
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/ipfire_proxy_exec.rb | exploit |
https://www.exploit-db.com/exploits/39765 | exploit |
https://www.asafety.fr/en/vuln-exploit-poc/xss-rce-ipfire-2-19-core-update-101-remote-command-execution/ | technical description third party advisory |
https://bugzilla.ipfire.org/show_bug.cgi?id=11087 | issue tracking |
https://www.vulncheck.com/advisories/ipfire-authenticated-rce | third party advisory |