Check Point Advisories

Netgate pfSense Stored Cross-Site Scripting (CVE-2019-12347)

Check Point Reference: CPAI-2019-1518
Date Published: 25 Nov 2019
Severity: High
Last Updated: 25 Nov 2019
Source:
Industry Reference:CVE-2019-12347
Protection Provided by:

Security Gateway
R80, R77, R75

Who is Vulnerable? pfSense
Vulnerability Description A stored cross-site scripting vulnerability exists in Netgate pfSense. The vulnerability is due to improper validation of the name and desc parameters in the acme_accountkeys_edit.php script file of the ACME package.Successful exploitation could allow the attacker to execute arbitrary script code in the context of the user's browser.

Protection Overview

This protection detects attempts to exploit this vulnerability.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the Netgate pfSense Stored Cross-Site Scripting (CVE-2019-12347) protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  Web Server Enforcement Violation.
Attack Information:  Netgate pfSense Stored Cross-Site Scripting (CVE-2019-12347)

This website uses cookies to ensure you get the best experience. Got it, Thanks! MORE INFO