First published: Wed Sep 26 2018(Updated: )
An authenticated command injection vulnerability exists in status_interfaces.php via dhcp_relinquish_lease() in pfSense before 2.4.4 due to its passing user input from the $_POST parameters "ifdescr" and "ipv" to a shell without escaping the contents of the variables. This allows an authenticated WebGUI user with privileges for the affected page to execute commands in the context of the root user when submitting a request to relinquish a DHCP lease for an interface which is configured to obtain its address via DHCP.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgate pfSense | <2.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16055 is an authenticated command injection vulnerability in pfSense before version 2.4.4.
CVE-2018-16055 has a severity rating of 8.8 (Critical).
Netgate pfSense versions up to and including 2.4.4 are affected by CVE-2018-16055.
To fix CVE-2018-16055, upgrade pfSense to version 2.4.4 or higher.
CVE-2018-16055 falls under CWE categories 77 (Improper Neutralization of Special Elements used in a Command ('Command Injection')) and 78 (Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')).