Refine your search

5 vulnerabilities found for pfSense CE by Netgate

CVE-2025-34176 (GCVE-0-2025-34176)
Vulnerability from nvd
Published
2025-09-09 20:14
Modified
2025-09-17 17:23
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
In pfSense CE /suricata/suricata_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related strings/characters. This value is directly used in a file existence check operation. While the contents of the file cannot be read, the server reveals whether the file exists, which enables an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: suricata package" permissions.
Impacted products
Vendor Product Version
Netgate pfSense CE Version: 7.0.8_2   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-34176",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-10T13:23:57.725858Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-10T13:24:04.508Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "Suricata",
          "product": "pfSense CE",
          "repo": "https://github.com/pfsense/FreeBSD-ports/tree/main",
          "vendor": "Netgate",
          "versions": [
            {
              "status": "affected",
              "version": "7.0.8_2",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Alex Williams (Pellera Technologies)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: transparent;\"\u003eIn pfSense CE\u0026nbsp;\u003c/span\u003e\u003ctt\u003e\u003cspan style=\"background-color: transparent;\"\u003e/suricata/suricata_ip_reputation.php\u003c/span\u003e\u003c/tt\u003e\u003cspan style=\"background-color: transparent;\"\u003e, the value of the \u003c/span\u003e\u003ctt\u003e\u003cspan style=\"background-color: transparent;\"\u003eiplist\u003c/span\u003e\u003c/tt\u003e\u003cspan style=\"background-color: transparent;\"\u003e parameter is not sanitized of directory traversal-related strings/characters. This value is directly used in a file existence check operation. While the contents of the file cannot be read, the server reveals whether the file exists, which enables an attacker to enumerate files on the target. The attacker must be authenticated with at least \"WebCfg - Services: suricata package\" permissions.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "In pfSense CE\u00a0/suricata/suricata_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related strings/characters. This value is directly used in a file existence check operation. While the contents of the file cannot be read, the server reveals whether the file exists, which enables an attacker to enumerate files on the target. The attacker must be authenticated with at least \"WebCfg - Services: suricata package\" permissions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-126",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-126 Path Traversal"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "LOW",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-17T17:23:54.821Z",
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck"
      },
      "references": [
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/pfsense/FreeBSD-ports/commit/97852ccfd201b24ee542be30af81272485fde0b4"
        },
        {
          "tags": [
            "issue-tracking"
          ],
          "url": "https://redmine.pfsense.org/issues/16414"
        },
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.vulncheck.com/advisories/netgate-pf-sense-ce-suricata-directory-traversal-information-disclosure"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Netgate pfSense CE Suricata Package v7.0.8_2 Directory Traversal Information Disclosure",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "cveId": "CVE-2025-34176",
    "datePublished": "2025-09-09T20:14:37.899Z",
    "dateReserved": "2025-04-15T19:15:22.567Z",
    "dateUpdated": "2025-09-17T17:23:54.821Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-34173 (GCVE-0-2025-34173)
Vulnerability from nvd
Published
2025-09-09 19:59
Modified
2025-09-17 17:18
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
In pfSense CE /usr/local/www/snort/snort_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related characters/strings before being used to check if a file exists. While the contents of the file cannot be read, the server reveals whether a file exists, which allows an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: Snort package" permissions.
Impacted products
Vendor Product Version
Netgate pfSense CE Version: 4.1.6_25   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-34173",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-10T20:18:33.100427Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-10T20:18:41.304Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "Snort",
          "product": "pfSense CE",
          "repo": "https://github.com/pfsense/FreeBSD-ports/tree/main",
          "vendor": "Netgate",
          "versions": [
            {
              "status": "affected",
              "version": "4.1.6_25",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Alex Williams (Pellera Technologies)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: transparent;\"\u003eIn pfSense CE\u0026nbsp;\u003c/span\u003e\u003ctt\u003e\u003cspan style=\"background-color: transparent;\"\u003e/usr/local/www/snort/snort_ip_reputation.php\u003c/span\u003e\u003c/tt\u003e\u003cspan style=\"background-color: transparent;\"\u003e, the value of the \u003c/span\u003e\u003ctt\u003e\u003cspan style=\"background-color: transparent;\"\u003eiplist\u003c/span\u003e\u003c/tt\u003e\u003cspan style=\"background-color: transparent;\"\u003e parameter is not sanitized of directory traversal-related characters/strings before being used to check if a file exists. While the contents of the file cannot be read, the server reveals whether a file exists, which allows an attacker to enumerate files on the target. The attacker must be authenticated with at least \"WebCfg - Services: Snort package\" permissions.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "In pfSense CE\u00a0/usr/local/www/snort/snort_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related characters/strings before being used to check if a file exists. While the contents of the file cannot be read, the server reveals whether a file exists, which allows an attacker to enumerate files on the target. The attacker must be authenticated with at least \"WebCfg - Services: Snort package\" permissions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-126",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-126 Path Traversal"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "LOW",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-17T17:18:08.104Z",
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck"
      },
      "references": [
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/pfsense/FreeBSD-ports/commit/d6f462bcc446969f8955c16cfde300d5c9ab7435"
        },
        {
          "tags": [
            "issue-tracking"
          ],
          "url": "https://redmine.pfsense.org/issues/16412"
        },
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.vulncheck.com/advisories/netgate-pf-sense-ce-snort-directory-traversal-information-disclosure"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Netgate pfSense CE Snort package v4.1.6_25 Directory Traversal Information Disclosure",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "cveId": "CVE-2025-34173",
    "datePublished": "2025-09-09T19:59:14.136Z",
    "dateReserved": "2025-04-15T19:15:22.567Z",
    "dateUpdated": "2025-09-17T17:18:08.104Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CERTFR-2025-AVI-0654
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Netgate. Elles permettent à un attaquant de provoquer une injection de code indirecte à distance (XSS).

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Netgate pfSense Plus pfSense Plus versions antérieures à 25.07
Netgate pfSense CE pfSense CE versions antérieures à 2.8.1
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "pfSense Plus versions ant\u00e9rieures \u00e0 25.07",
      "product": {
        "name": "pfSense Plus",
        "vendor": {
          "name": "Netgate",
          "scada": false
        }
      }
    },
    {
      "description": "pfSense CE versions ant\u00e9rieures \u00e0 2.8.1",
      "product": {
        "name": "pfSense CE",
        "vendor": {
          "name": "Netgate",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [],
  "initial_release_date": "2025-08-05T00:00:00",
  "last_revision_date": "2025-08-05T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0654",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Netgate. Elles permettent \u00e0 un attaquant de provoquer une injection de code indirecte \u00e0 distance (XSS).",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Netgate",
  "vendor_advisories": [
    {
      "published_at": "2025-08-04",
      "title": "Bulletin de s\u00e9curit\u00e9 Netgate pfSense-SA-25_08",
      "url": "https://docs.netgate.com/downloads/pfSense-SA-25_08.webgui.asc"
    }
  ]
}

CERTFR-2025-AVI-0423
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Netgate. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Netgate pfSense Plus pfSense Plus versions antérieures à 25.07
Netgate pfSense CE pfSense CE versions antérieures à 2.9.0
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "pfSense Plus versions ant\u00e9rieures \u00e0 25.07",
      "product": {
        "name": "pfSense Plus",
        "vendor": {
          "name": "Netgate",
          "scada": false
        }
      }
    },
    {
      "description": "pfSense CE versions ant\u00e9rieures \u00e0 2.9.0",
      "product": {
        "name": "pfSense CE",
        "vendor": {
          "name": "Netgate",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-57273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57273"
    },
    {
      "name": "CVE-2024-54779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54779"
    },
    {
      "name": "CVE-2024-54780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54780"
    }
  ],
  "initial_release_date": "2025-05-19T00:00:00",
  "last_revision_date": "2025-05-19T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0423",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-05-19T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Netgate. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Netgate",
  "vendor_advisories": [
    {
      "published_at": "2025-05-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Netgate pfSense-SA-25_03",
      "url": "https://docs.netgate.com/downloads/pfSense-SA-25_03.webgui.asc"
    },
    {
      "published_at": "2025-05-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Netgate pfSense-SA-25_05",
      "url": "https://docs.netgate.com/downloads/pfSense-SA-25_05.webgui.asc"
    },
    {
      "published_at": "2025-05-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Netgate pfSense-SA-25_06",
      "url": "https://docs.netgate.com/downloads/pfSense-SA-25_06.webgui.asc"
    },
    {
      "published_at": "2025-05-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Netgate pfSense-SA-25_04",
      "url": "https://docs.netgate.com/downloads/pfSense-SA-25_04.webgui.asc"
    },
    {
      "published_at": "2025-05-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Netgate pfSense-SA-25_02",
      "url": "https://docs.netgate.com/downloads/pfSense-SA-25_02.webgui.asc"
    },
    {
      "published_at": "2025-05-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Netgate pfSense-SA-25_01",
      "url": "https://docs.netgate.com/downloads/pfSense-SA-25_01.webgui.asc"
    },
    {
      "published_at": "2025-05-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Netgate pfSense-SA-25_07",
      "url": "https://docs.netgate.com/downloads/pfSense-SA-25_07.webgui.asc"
    }
  ]
}

CERTFR-2024-AVI-1019
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Netgate pfSense. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une injection de code indirecte à distance (XSS) et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Netgate pfSense CE pfSense CE versions antérieures à 2.8.0
Netgate pfSense Plus pfSense Plus versions antérieures à 24.11
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "pfSense CE versions ant\u00e9rieures \u00e0 2.8.0",
      "product": {
        "name": "pfSense CE",
        "vendor": {
          "name": "Netgate",
          "scada": false
        }
      }
    },
    {
      "description": "pfSense Plus versions ant\u00e9rieures \u00e0 24.11",
      "product": {
        "name": "pfSense Plus",
        "vendor": {
          "name": "Netgate",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [],
  "initial_release_date": "2024-11-26T00:00:00",
  "last_revision_date": "2024-11-26T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-1019",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-11-26T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Netgate pfSense. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une injection de code indirecte \u00e0 distance (XSS) et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Netgate pfSense",
  "vendor_advisories": [
    {
      "published_at": "2024-11-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Netgate pfSense-SA-24_05",
      "url": "https://docs.netgate.com/downloads/pfSense-SA-24_05.webgui.asc"
    },
    {
      "published_at": "2024-11-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Netgate pfSense-SA-24_07",
      "url": "https://docs.netgate.com/downloads/pfSense-SA-24_07.dhclient.asc"
    },
    {
      "published_at": "2024-11-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Netgate pfSense-SA-24_08",
      "url": "https://docs.netgate.com/downloads/pfSense-SA-24_08.webgui.asc"
    },
    {
      "published_at": "2024-11-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Netgate pfSense-SA-24_06",
      "url": "https://docs.netgate.com/downloads/pfSense-SA-24_06.sshguard.asc"
    }
  ]
}