cve/2018/CVE-2018-4019.md

19 lines
1007 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-4019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4019)
![](https://img.shields.io/static/v1?label=Product&message=Netgate%20pfSense&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=OS%20command%20injection&color=brighgreen)
### Description
An exploitable command injection vulnerability exists in the way Netgate pfSense CE 2.4.4-RELEASE processes the parameters of a specific POST request. The attacker can exploit this and gain the ability to execute arbitrary commands on the system. An attacker needs to be able to send authenticated POST requests to the administration web interface. Command injection is possible in the `powerd_normal_mode` parameter.
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690
2024-06-09 00:33:16 +00:00
- https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.