CVE-2019-12949

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-12949
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-12949.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-12949
Published
2019-06-25T11:15:10Z
Modified
2025-02-14T10:51:49.466668Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

In pfSense 2.4.4-p2 and 2.4.4-p3, if it is possible to trick an authenticated administrator into clicking on a button on a phishing page, an attacker can leverage XSS to upload arbitrary executable code, via diagcommand.php and rrdfetch_json.php (timePeriod parameter), to a server. Then, the remote attacker can run any command with root privileges on that server.

References

Affected packages

Git / github.com/pfsense/freebsd-ports

Affected ranges

Type
GIT
Repo
https://github.com/pfsense/freebsd-ports
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected

Affected versions

Other

END-OF-2015Q4
devel_before_hashes_changed

v2.*

v2.4.4
v2.4.4_1
v2.4.4_2
v2.4.4_3