Vulnerability Details : CVE-2021-41282
Public exploit exists!
diag_routes.php in pfSense 2.5.2 allows sed data injection. Authenticated users are intended to be able to view data about the routes set in the firewall. The data is retrieved by executing the netstat utility, and then its output is parsed via the sed utility. Although the common protection mechanisms against command injection (i.e., the usage of the escapeshellarg function for the arguments) are used, it is still possible to inject sed-specific code and write an arbitrary file in an arbitrary location.
Exploit prediction scoring system (EPSS) score for CVE-2021-41282
97.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2021-41282
-
pfSense Diag Routes Web Shell Upload
Disclosure Date: 2022-02-23First seen: 2022-12-23exploit/unix/http/pfsense_diag_routes_webshellThis module exploits an arbitrary file creation vulnerability in the pfSense HTTP interface (CVE-2021-41282). The vulnerability affects versions <= 2.5.2 and can be exploited by an authenticated user if they have the "WebCfg - Diagnostics: Routing tables" pri
CVSS scores for CVE-2021-41282
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2021-41282
-
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-41282
-
https://www.shielder.it/advisories/pfsense-remote-command-execution/
Shielder - Remote Code Execution in pfSense <= 2.5.2Exploit;Third Party Advisory
-
http://packetstormsecurity.com/files/166208/pfSense-2.5.2-Shell-Upload.html
pfSense 2.5.2 Shell Upload ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://docs.netgate.com/pfsense/en/latest/releases/22-01_2-6-0.html
Releases — 22.01/2.6.0 New Features and Changes | pfSense DocumentationRelease Notes;Third Party Advisory
-
https://www.shielder.it/advisories/
Shielder - AdvisoriesThird Party Advisory
Products affected by CVE-2021-41282
- cpe:2.3:a:pfsense:pfsense:2.5.2:*:*:*:*:*:*:*