FreeNAS 'exec_raw.php' Arbitrary Command Execution

critical Nessus Plugin ID 50510

Synopsis

A web application on the remote host is affected by an arbitrary command execution vulnerability.

Description

The version of FreeNAS on the remote host fails to restrict access to its 'exec_raw.php' script. A remote, unauthenticated attacker can pass arbitrary commands through the script's 'cmd' parameter and have them executed with administrative privileges.

Solution

Upgrade to FreeNAS 0.7.2.5543 or later.

See Also

https://www.tenable.com/security/research/tra-2010-04

http://www.nessus.org/u?64e77341

http://www.nessus.org/u?14bfd2c5

http://www.nessus.org/u?aae7b1b3

Plugin Details

Severity: Critical

ID: 50510

File Name: freenas_exec_raw_noauth.nasl

Version: 1.18

Type: remote

Family: CGI abuses

Published: 11/8/2010

Updated: 1/19/2021

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 9.5

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:F/RL:U/RC:ND

Vulnerability Information

Required KB Items: installed_sw/FreeNAS

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 11/6/2010

Vulnerability Publication Date: 11/6/2010

Exploitable With

Metasploit (FreeNAS exec_raw.php Arbitrary Command Execution)

Reference Information

BID: 44974