FreeNAS 'exec_raw.php' Arbitrary Command Execution

Critical Nessus Plugin ID 50510

Synopsis

A web application on the remote host is affected by an arbitrary command execution vulnerability.

Description

The version of FreeNAS on the remote host fails to restrict access to its 'exec_raw.php' script. A remote, unauthenticated attacker can pass arbitrary commands through the script's 'cmd' parameter and have them executed with administrative privileges.

Solution

Upgrade to FreeNAS 0.7.2.5543 or later.

See Also

https://www.tenable.com/security/research/tra-2010-04

http://www.nessus.org/u?64e77341

http://www.nessus.org/u?14bfd2c5

http://www.nessus.org/u?aae7b1b3

Plugin Details

Severity: Critical

ID: 50510

File Name: freenas_exec_raw_noauth.nasl

Version: 1.17

Type: remote

Family: CGI abuses

Published: 2010/11/08

Updated: 2018/06/14

Dependencies: 50509

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 9.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

Vulnerability Information

Required KB Items: installed_sw/FreeNAS

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 2010/11/06

Vulnerability Publication Date: 2010/11/06

Exploitable With

Metasploit (FreeNAS exec_raw.php Arbitrary Command Execution)

Reference Information

BID: 44974