pfsense 2.3.2: CSRFDate: 2017-03-24 10:00:00
|Affected Product:||pfsense 2.3.2|
|Fixed Version Link:||https://pfsense.org/download/|
|Reported to vendor:||02/06/2017|
|Disclosed to public:||03/24/2017|
|Release mode:||Coordinated Release|
|CVE:||requested via DWF|
|Credits||Tim Coen of Curesec GmbH|
pfsense is an open source firewall. The web interface is written in PHP. In version 2.3.2-RELEASE (amd64), the actions of creating and deleting firewall rules are vulnerable to CSRF, enabling an Attacker to edit these rules with a little bit of social engineering.
CVSS: Medium; 5.4 https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
Description: The easyrule.php script is vulnerable to CSRF, which allows an attacker to create or delete firewall rules via CSRF.
Proof of Concept:
To mitigate this issue please upgrade at least to version 2.3.3:
Please note that a newer version might already be available.
5. Report Timeline
|02/06/2017||Informed Vendor about Issue|
|02/07/2017||Vendor confirms + fixes issues in git|
|02/20/2017||Vendor relases fix + vendor advisory|
|03/24/2017||Disclosed to public|