NA

CVE-2022-31814

Published: 05/09/2022 Updated: 14/05/2024
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

pfSense pfBlockerNG up to and including 2.1.4_26 allows remote malicious users to execute arbitrary OS commands as root via shell metacharacters in the HTTP Host header. NOTE: 3.x is unaffected.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

netgate pfblockerng

Exploits

# Exploit Title: pfBlockerNG 214_26 - Remote Code Execution (RCE) # Shodan Results: wwwshodanio/search?query=httptitle%3A%22pfSense+-+Login%22+%22Server%3A+nginx%22+%22Set-Cookie%3A+PHPSESSID%3D%22 # Date: 5th of September 2022 # Exploit Author: IHTeam # Vendor Homepage: docsnetgatecom/pfsense/en/latest/packages/pfblockerhtm ...
pfBlockerNG version 214_26 remote code execution exploit ...

Github Repositories

CVE-2022-31814 Exploitation Toolkit.

SenselessViolence CVE-2022-31814 (pfSense pfBlockerNG <= 214_26) Exploitation Toolkit What? This is an exploitation toolkit for the pfSense pfBlockerNG <= 214_26 plugins remote command injection feature discovered by IHTeam I wrote this to play around with some of the design principles found in the NSA's firewall exploitation toolkit - for this reason,

♥️RCE CVE-2022-31814 git clone githubcom/Knownasjohnn/RCE cd RCE python3 rcepy

CVE-2022-31814 Reworked and optimized exploit script of pfBlockerNG 214_26 vulnerability Exploit Title: pfBlockerNG 214_26 - Remote Code Execution (RCE) Shodan Results: wwwshodanio/search?query=httptitle%3A%22pfSense+-+Login%22+%22Server%3A+nginx%22+%22Set-Cookie%3A+PHPSESSID%3D%22 Date: 5th of September 2022 Exploit Author: IHTeam Vendor Homepage: doc

CVE-2022-31814

CVE-2022-31814 WebApp bug import argparse import requests import time import sys import urllibparse from requestspackagesurllib3exceptions import InsecureRequestWarning requestspackagesurllib3disable_warnings(InsecureRequestWarning) parser = argparseArgumentParser(description="pfBlockerNG <= 214_26 Unauth RCE") parseradd_argument('--url'