First published: Wed Jul 02 2014(Updated: )
pfSense before 2.1.4 allows remote authenticated users to execute arbitrary commands via (1) the hostname value to diag_dns.php in a Create Alias action, (2) the smartmonemail value to diag_smart.php, or (3) the database value to status_rrd_graph_img.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgate pfSense Community Edition | <=2.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4688 is considered a high severity vulnerability due to the potential for remote authenticated users to execute arbitrary commands.
To fix CVE-2014-4688, upgrade pfSense to version 2.1.4 or later.
CVE-2014-4688 affects pfSense versions before 2.1.4.
CVE-2014-4688 can be exploited through the hostname value in diag_dns.php, the smartmonemail value in diag_smart.php, and the database value in status_rrd_graph_img.php.
Yes, there are known exploits for CVE-2014-4688 that leverage the vulnerabilities in pfSense versions before 2.1.4.