CVE-2019-12949
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
In pfSense 2.4.4-p2 and 2.4.4-p3, if it is possible to trick an authenticated administrator into clicking on a button on a phishing page, an attacker can leverage XSS to upload arbitrary executable code, via diag_command.php and rrd_fetch_json.php (timePeriod parameter), to a server. Then, the remote attacker can run any command with root privileges on that server.
En pfSense versiones 2.4.4-p2 y 2.4.4-p3, si es posible engañar a un administrador autenticado para que haga cliquee sobre un botón en una página de phishing, un atacante puede aprovechar un XSS para cargar código ejecutable arbitrario, por medio de los archivos diag_command.php y rrd_fetch_json .php (parámetro timePeriod), hacia un servidor. Después, el atacante remoto puede ejecutar cualquier comando con privilegios root en ese servidor.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-06-24 CVE Reserved
- 2019-06-25 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/tarantula-team/CVE-2019-12949 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Netgate Search vendor "Netgate" | Pfsense Search vendor "Netgate" for product "Pfsense" | 2.4.4 Search vendor "Netgate" for product "Pfsense" and version "2.4.4" | p2 |
Affected
| ||||||
Netgate Search vendor "Netgate" | Pfsense Search vendor "Netgate" for product "Pfsense" | 2.4.4 Search vendor "Netgate" for product "Pfsense" and version "2.4.4" | p3 |
Affected
|