FreeNAS 'exec_raw.php' Arbitrary Command Execution

Critical Nessus Plugin ID 50510


A web application on the remote host is affected by an arbitrary command execution vulnerability.


The version of FreeNAS on the remote host fails to restrict access to its 'exec_raw.php' script. A remote, unauthenticated attacker can pass arbitrary commands through the script's 'cmd' parameter and have them executed with administrative privileges.


Upgrade to FreeNAS or later.

See Also

Plugin Details

Severity: Critical

ID: 50510

File Name: freenas_exec_raw_noauth.nasl

Version: 1.17

Type: remote

Family: CGI abuses

Published: 2010/11/08

Updated: 2018/06/14

Dependencies: 50509

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 9.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

Vulnerability Information

Required KB Items: installed_sw/FreeNAS

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 2010/11/06

Vulnerability Publication Date: 2010/11/06

Exploitable With

Metasploit (FreeNAS exec_raw.php Arbitrary Command Execution)

Reference Information

BID: 44974