Description
In pfSense 2.4.4-p2 and 2.4.4-p3, if it is possible to trick an authenticated administrator into clicking on a button on a phishing page, an attacker can leverage XSS to upload arbitrary executable code, via diag_command.php and rrd_fetch_json.php (timePeriod parameter), to a server. Then, the remote attacker can run any command with root privileges on that server.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://github.com/tarantula-team/CVE-2019-12949 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:32:55.584Z
Reserved: 2019-06-24T00:00:00.000Z
Link: CVE-2019-12949
No data.
Status : Modified
Published: 2019-06-25T11:15:10.280
Modified: 2024-11-21T04:23:53.053
Link: CVE-2019-12949
No data.
OpenCVE Enrichment
No data.
Weaknesses