FreeNAS < 0.7.2 Revision 5543 Command Execution Vulnerability

high Nessus Network Monitor Plugin ID 5714
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

A web application on the remote host is affected by an arbitrary command execution vulnerability.

Description

The remote host is running FreeNAS, a network attached storage distribution based on FreeBSD.

Versions of FreeNAS earlier than 0.7.2 Revision 5543 are potentially affected by a remote command execution vulnerability because the application fails to restrict access to the 'exec_raw.php' script. A remote, unauthenticated attacker can pass arbitrary commands through the script's 'cmd' parameter and have them executed with root privileges.

Solution

Upgrade to FreeNAS 0.7.2 Revision 5543 or later.

See Also

http://freenas.svn.sourceforge.net/viewvc/freenas/branches/0.7/www/exec_raw.php?r1=5186&r2=5540

http://sourceforge.net/projects/freenas/files//stable/0.7.2/NOTES%200.7.2.5543.txt/view

Plugin Details

Severity: High

ID: 5714

Family: CGI

Published: 11/22/2010

Updated: 3/6/2019

Dependencies: 1442

Nessus ID: 50510

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X

Vulnerability Information

Patch Publication Date: 11/6/2010

Vulnerability Publication Date: 11/6/2010

Reference Information

BID: 44974