First published: Thu Sep 26 2019(Updated: )
An issue was discovered in pfSense through 2.4.4-p3. widgets/widgets/picture.widget.php uses the widgetkey parameter directly without sanitization (e.g., a basename call) for a pathname to file_get_contents or file_put_contents.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgate pfSense | <2.4.4 | |
Netgate pfSense | =2.4.4 | |
Netgate pfSense | =2.4.4-p1 | |
Netgate pfSense | =2.4.4-p2 | |
Netgate pfSense | =2.4.4-p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-16915 is critical (9.8).
The affected software of CVE-2019-16915 is Netgate pfSense version 2.4.4-p3.
CVE-2019-16915 allows an attacker to provide a specially crafted widgetkey parameter, leading to untrusted input being passed to file_get_contents or file_put_contents functions.
Yes, patches are available for CVE-2019-16915. Please refer to the references for more details.
You can find more information about CVE-2019-16915 in the references section.