Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    CVE-2019-16701

    Messages from the pfSense Team
    7
    15
    3.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • dennis_sD
      dennis_s
      last edited by

      This is not a valid bug and the process is working as designed. If you give a user permission to run commands and code, they will, in fact, be able to do such. Also, this was never reported to pfSense for us to validate, not that we would have considered it a valid report anyhow.

      G 1 Reply Last reply Reply Quote 0
      • kiokomanK
        kiokoman LAYER 8
        last edited by

        i don't understand.. is him discovering hot water? or am i understanding it wrong ? how could it be an exploit if you need username and password to gain access ?

        ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
        Please do not use chat/PM to ask for help
        we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
        Don't forget to Upvote with the 👍 button for any post you find to be helpful.

        1 Reply Last reply Reply Quote 0
        • JeGrJ
          JeGr LAYER 8 Moderator
          last edited by

          @kiokoman if you want the long explanation, watch our colleagues from LTS (no advertising ;))

          https://www.lawrencesystems.com/testing-proof-of-concept-code-does-cve-2019-16701-allow-remote-code-injection-in-pfsense/

          Like they say: if you already had or are near to owning the "keys to the castle", unlocking the fortress isn't that much dark magic anymore :)

          @dennis_s said in CVE-2019-16701:

          not that we would have considered it a valid report anyhow.

          But he could have avoided being publicly exposed to chuckles - or worse ;)

          Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

          If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

          1 Reply Last reply Reply Quote 3
          • kiokomanK
            kiokoman LAYER 8
            last edited by

            the first thing I saw was the code at packetstormsecurity.com
            the first thing i noticed was
            "--rhost", help = "Target Uri https://127.0.0.1"
            "--password", help = "pfsense Password"
            and i say to myself .. wtf 😂

            ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
            Please do not use chat/PM to ask for help
            we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
            Don't forget to Upvote with the 👍 button for any post you find to be helpful.

            1 Reply Last reply Reply Quote 0
            • JeGrJ
              JeGr LAYER 8 Moderator
              last edited by

              @kiokoman said in CVE-2019-16701:

              and i say to myself .. wtf

              Indeed. But that could have been credentials from a non-priv user. Then it would be some sort of priv-escalation, but even then: calling it remote code execution was ambitious at best :) No one says the whole project is bug-free. But if you find some serious shit like a RCE - you call the vendor before writing some half-assed CVE. Or you post that at darknet forums to become famous and get that zero$day$$$ money. But posting it publicly without alerting the vendor? That's just bad style.

              Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

              If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

              1 Reply Last reply Reply Quote 2
              • G
                guardian Rebel Alliance @dennis_s
                last edited by

                @dennis_s Can someone please explain this?

                I had a look at:
                link text

                and I'm not sure what is going on here.

                Remote host: https://127.0.0.1 - Is this code supposed to be running on the pfSense box?

                I'm not a dev, but unsanitized eval() is far from best practice! Is this actually what is going on?

                What are the RPC calls? Is this someone fuzzing the webGUI with a known username and password?

                Is this a warning about some settings in pfSense that might inadvertently be set incorrectly?

                If this is total BS, what is being done to get this out of the CVE database? It is giving pfSense (I assume unfairly) a bad name.

                If you find my post useful, please give it a thumbs up!
                pfSense 2.7.2-RELEASE

                jimpJ 1 Reply Last reply Reply Quote 0
                • kiokomanK
                  kiokoman LAYER 8
                  last edited by

                  it's total BS i'm still trying to understand how it could be identified as a remote exploit
                  no one have the webgui exposed to the wan so you can't exploit from there
                  you can use that script from the LAN (the 127.0.0.1 is only an example, you can change it with the LAN ip of pfsense) but you must know username and password... also most of us have the webgui accessible only from a specific interface/vlan used for management
                  you can try to bruteforce the password (also total BS) and the possibility of not being discovered in the meantime is very low.
                  maybe you can use it on a new, unconfigured pfsense and from the LAN interface

                  ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                  Please do not use chat/PM to ask for help
                  we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                  Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                  1 Reply Last reply Reply Quote 1
                  • jimpJ
                    jimp Rebel Alliance Developer Netgate @guardian
                    last edited by

                    @guardian said in CVE-2019-16701:

                    @dennis_s Can someone please explain this?

                    We already have, a few times. Here, on Reddit, Twitter, etc. It's bunk.

                    I had a look at:
                    link text

                    and I'm not sure what is going on here.

                    Someone completely misunderstood the purpose of the page and how privileges work.

                    Remote host: https://127.0.0.1 - Is this code supposed to be running on the pfSense box?

                    That's just their example, it could be anywhere that is capable of reaching the GUI process.

                    I'm not a dev, but unsanitized eval() is far from best practice! Is this actually what is going on?

                    It's necessary for XMLRPC sync between HA nodes so certain code can be run by the primary on the secondary node, for example. It requires either admin user access or a user that has been specifically granted access to the page.

                    What are the RPC calls? Is this someone fuzzing the webGUI with a known username and password?

                    It's code for HA sync and related actions. And as mentioned previously, it doesn't matter what the user is unless it's admin or a special user granted specific access to this function. Users do not get access to it by default.

                    Is this a warning about some settings in pfSense that might inadvertently be set incorrectly?

                    There are already warnings about privileges that effectively grant admin-level access, visible on the privilege assignment screens. Though this particular privilege doesn't have that warning in release versions yet.

                    If this is total BS, what is being done to get this out of the CVE database? It is giving pfSense (I assume unfairly) a bad name.

                    I'm not sure what, if anything, can be done. There have been BS reports before, and I'm sure there will be in the future. It was removed from exploitdb not long after it was posted, at least.

                    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    G 1 Reply Last reply Reply Quote 2
                    • G
                      guardian Rebel Alliance @jimp
                      last edited by

                      @jimp said in CVE-2019-16701:

                      We already have, a few times. Here, on Reddit, Twitter, etc. It's bunk.

                      Thanks for taking the time @jimp .... IIUC then:

                      1. Unless you have the WebGUI accessable from the WAN, then no one can access the RPC from the WAN -- Therefore it is not a REMOTE exploit.
                      2. Unless you have the admin password or the password for a specially configured user, then this can not be used -- If an attacker has the admin password, it's game over anyway!
                      3. Other than the default admin user, it would take deliberate action to configure a user that could execute the RPC, and there are warnings on the page so that a noob didn't do it without some awareness that it was happening.

                      As you said, not really any more dangerous than the WebGUI....

                      Only thing might be a good thing to rate limit bad password attempts to prevent brute force attacks.... but again, if it's only on the LAN, the risk is limited to an already compromised network.

                      If you find my post useful, please give it a thumbs up!
                      pfSense 2.7.2-RELEASE

                      jimpJ 1 Reply Last reply Reply Quote 0
                      • KOMK
                        KOM
                        last edited by

                        @guardian said in CVE-2019-16701:

                        Only thing might be a good thing to rate limit bad password attempts to prevent brute force attacks....

                        System - Advanced - Admin Access - Login Protection

                        G 1 Reply Last reply Reply Quote 1
                        • KOMK
                          KOM
                          last edited by

                          For some reason, in this specific forum we can post but we can't edit or delete our own posts.

                          kiokomanK 1 Reply Last reply Reply Quote 0
                          • G
                            guardian Rebel Alliance @KOM
                            last edited by

                            @KOM said in CVE-2019-16701:

                            @guardian said in CVE-2019-16701:

                            Only thing might be a good thing to rate limit bad password attempts to prevent brute force attacks....

                            System - Advanced - Admin Access - Login Protection

                            Thanks... I didn't realize that was there, and it appears to be set by default to 3 bad attempts/30 minutes...

                            Does this apply to the RPC calls? If so, then brute force attacks are a total non-issue unless you have a very stupid/weak password.

                            If you find my post useful, please give it a thumbs up!
                            pfSense 2.7.2-RELEASE

                            O 1 Reply Last reply Reply Quote 0
                            • kiokomanK
                              kiokoman LAYER 8 @KOM
                              last edited by

                              @KOM
                              indeed, we must be careful about what we write or it could be the end 😈

                              ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                              Please do not use chat/PM to ask for help
                              we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                              Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                              1 Reply Last reply Reply Quote 0
                              • jimpJ
                                jimp Rebel Alliance Developer Netgate @guardian
                                last edited by

                                @guardian said in CVE-2019-16701:

                                1. Unless you have the WebGUI accessable from the WAN, then no one can access the RPC from the WAN -- Therefore it is not a REMOTE exploit.

                                Technically if it's possible from any system other than the firewall itself, it can be considered "remote" since it's not a "local" exploit, and it can happen across the network. Though you are correct in that there is no danger unless you have (foolishly) opened your GUI to the world.

                                1. Unless you have the admin password or the password for a specially configured user, then this can not be used -- If an attacker has the admin password, it's game over anyway!

                                Exactly. If you grant a user permission to run remote commands, don't be surprised when they can run remote commands.

                                1. Other than the default admin user, it would take deliberate action to configure a user that could execute the RPC, and there are warnings on the page so that a noob didn't do it without some awareness that it was happening.

                                There are more warnings now about the permission in general, but yes. And there are a number of permissions that could also give someone access to perform admin-level operations (such as granting permission to access diag_command.php). That said, some people do select-all on the permissions list not knowing what they are doing. There is no more danger from this specific page than others they would also grant access for when making that mistake, however.

                                Only thing might be a good thing to rate limit bad password attempts to prevent brute force attacks.... but again, if it's only on the LAN, the risk is limited to an already compromised network.

                                That is already done via sshguard, though there are improvements there on the current development code to ensure the XMLRPC auth failures get caught along with other bad auth attempts.

                                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                Need help fast? Netgate Global Support!

                                Do not Chat/PM for help!

                                1 Reply Last reply Reply Quote 0
                                • O
                                  Oliver12 @guardian
                                  last edited by

                                  if you find some serious shit like a RCE - you call the vendor before writing some half-assed CVE. Or you post that at darknet forums to become famous and get that zero$day$$$ money. But posting it publicly without alerting the vendor? That's just bad style.

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.