FreeNAS 'exec_raw.php' Arbitrary Command Execution

critical Nessus Plugin ID 50510


A web application on the remote host is affected by an arbitrary command execution vulnerability.


The version of FreeNAS on the remote host fails to restrict access to its 'exec_raw.php' script. A remote, unauthenticated attacker can pass arbitrary commands through the script's 'cmd' parameter and have them executed with administrative privileges.


Upgrade to FreeNAS or later.

See Also

Plugin Details

Severity: Critical

ID: 50510

File Name: freenas_exec_raw_noauth.nasl

Version: 1.18

Type: remote

Family: CGI abuses

Published: 11/8/2010

Updated: 1/19/2021

Risk Information


Risk Factor: Critical

Base Score: 10

Temporal Score: 9.5

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:F/RL:U/RC:ND

Vulnerability Information

Required KB Items: installed_sw/FreeNAS

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 11/6/2010

Vulnerability Publication Date: 11/6/2010

Exploitable With

Metasploit (FreeNAS exec_raw.php Arbitrary Command Execution)

Reference Information

BID: 44974