Feature #14696
closed
if I can force it to say hello world, you could force it to say it a million times and do a denial of service attack in theory, or inject a shell program. I just thought it was weird we did adjustments like this in Cyber security class we would go through lists to test adjusting the URLS like this. My concern is it responded at all versus just having the input validation. Any thoughts here?
I wonder if there is any php injection vulnerabilities here. I did get it to say hello world. I noticed there is some CVEs listed for cross site scripting issues for pfsense, maybe it's issues like this that are being exploited. Again this would only be an issue if you have your management port open to all users.
sgerror.php is also still accessible even with the internal error redirector redirecting to external site like Google.com.
Please see attached photos
Redirector does direct also to Google now however I can still get to sgerror.php
This should in theory no longer be accessible if you are not using it or it is set to EXT URL.
/usr/local/www/sgerror.php
has no ability to disable internal error redirect functionality when utilizing external redirect.
- Status changed from New to Rejected
That action is just echoing back the input to the user but as it passes through a query string and so on, the contents are not evaluated, only printed. It ends up encoded in a way that doesn't make it possible to execute anything. I tossed a bunch of different inputs at it (various PHP commands, exec commands, javascript tags, and so on) and thus far have been unable to produce anything other than benign output. Not even rendered HTML, just URL encoded strings.
It could maybe use an extra layer of encoding for safety but it doesn't appear to be critical unless it's something browser-specific that I've been unable to trigger.
Also in the future, this is NOT the place or method to report suspected security issues. Please report them responsibly as detailed on https://www.netgate.com/security and do not discuss them publicly.
Thanks for looking at this and testing the various inputs. I did not know about the other reporting URL I will use that next time.
Also available in: Atom
PDF