In pfSense 2.4.4-p2 and 2.4.4-p3, if it is possible to trick an authenticated administrator into clicking on a button on a phishing page, an attacker can leverage XSS to upload arbitrary executable code, via diag_command.php and rrd_fetch_json.php (timePeriod parameter), to a server. Then, the remote attacker can run any command with root privileges on that server.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/tarantula-team/CVE-2019-12949 |
|
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:32:55.584Z
Reserved: 2019-06-24T00:00:00
Link: CVE-2019-12949
No data.
Status : Modified
Published: 2019-06-25T11:15:10.280
Modified: 2024-11-21T04:23:53.053
Link: CVE-2019-12949
No data.
OpenCVE Enrichment
No data.
Weaknesses