pfSense Multiple Vulnerabilities


Description   Multiple vulnerabilities have been reported in in pfSense, which can be exploited by malicious people to conduct brute force and cross-site scripting attacks, bypass certain security restrictions, cause a DoS (Denial of Service).
1) Multiple errors are caused due to a bundled vulnerable version of OpenSSL.
For more information:
SA61702
2) An error exists due to a bundled vulnerable version of NTP.
For more information:
SA61041 (#4)
3) An error exists due to a bundled vulnerable version of OpenVPN.
For more information:
SA62628
4) Certain input passed to edit.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
5) Certain input related to the captive portal status widget is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
6) Certain input related to the Notifications page is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerabilities are reported in versions 2.1.5 and prior.
     
Vulnerable Products   Vulnerable OS:
pfSense 2.xVulnerable Software:
     
Solution   Update to version 2.2.
     
CVE   CVE-2015-0206
CVE-2015-0205
CVE-2015-0204
CVE-2014-9295
CVE-2014-9294
CVE-2014-8275
CVE-2014-8104
CVE-2014-3572
CVE-2014-3571
CVE-2014-3569
     
References   pfSense:
https://blog.pfsense.org/?p=1546
https://www.pfsense.org/security/advisories/pfSense-SA-15_01.webgui.asc
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - POST : suspicious tag with event found in data
3.2.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'object' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
3.2.0
XSS - Prevention - POST : 'location' javascript object found in data
3.2.0
XSS - Prevention - POST : javascript code found in data
3.2.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
3.2.0
XSS - Prevention - POST : code allowing cookie access found in data
3.2.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
3.2.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'div' tag found in data
3.2.0
XSS - Prevention - POST : 'script' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' tag found in data
5.0.0
XSS - Prevention - POST : javascript code found in data
5.0.0
XSS - Prevention - POST : suspicious tag with event found in data
5.0.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
5.0.0
XSS - Prevention - POST : 'location' javascript object found in data
5.0.0
XSS - Prevention - POST : code allowing cookie access found in data
5.0.0
XSS - Prevention - POST : 'script' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'div' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'object' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
5.0.0
     


 
 
 
 
 Risk level 
Low 

 Vulnerability First Public Report Date 
2015-01-27 

 Target Type 
Server 

 Possible exploit 
Remote