CVE-2025-53392

5.0 MEDIUM

📋 TL;DR

This vulnerability in pfSense CE 2.8.0 allows users with the 'WebCfg - Diagnostics: Command' privilege to read arbitrary files through directory traversal in the diag_command.php dlPath parameter. It affects pfSense CE installations where users have been granted this specific diagnostic privilege. The vendor considers this intended behavior for users with this privilege level.

💻 Affected Systems

Products:
  • Netgate pfSense CE
Versions: 2.8.0
Operating Systems: FreeBSD-based
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when users have been explicitly granted the 'WebCfg - Diagnostics: Command' privilege. This is not a default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with the required privilege could read sensitive system files including configuration files, password hashes, SSH keys, and other confidential data, potentially leading to full system compromise.

🟠

Likely Case

Authorized users with the diagnostic privilege could inadvertently or intentionally access files outside intended directories, exposing sensitive information.

🟢

If Mitigated

With proper privilege separation and access controls, only trusted administrators have the diagnostic privilege, limiting exposure to authorized personnel.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication with the specific diagnostic privilege. The vulnerability is directory traversal via dlPath parameter manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: N/A

Restart Required: No

Instructions:

No official patch available as vendor considers this intended behavior. Review and restrict diagnostic privileges as workaround.

🔧 Temporary Workarounds

Restrict Diagnostic Privileges

all

Review user accounts and remove 'WebCfg - Diagnostics: Command' privilege from users who don't require it.

Navigate to System > User Manager in pfSense web interface, edit user privileges, and remove 'WebCfg - Diagnostics: Command'

Implement Principle of Least Privilege

all

Ensure only essential administrative users have diagnostic command access.

Regularly audit user privileges in System > User Manager

🧯 If You Can't Patch

  • Implement strict access controls and limit diagnostic privileges to essential personnel only
  • Monitor logs for unusual file access patterns from diagnostic commands

🔍 How to Verify

Check if Vulnerable:

Check if running pfSense CE 2.8.0 and review which users have 'WebCfg - Diagnostics: Command' privilege in System > User Manager.

Check Version:

cat /etc/version

Verify Fix Applied:

Verify no unauthorized users have diagnostic privileges and monitor for any directory traversal attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in web server logs
  • Multiple requests to diag_command.php with directory traversal patterns

Network Indicators:

  • HTTP requests to diag_command.php with ../ sequences in parameters

SIEM Query:

source="pfSense-web" AND uri="*diag_command.php*" AND (param="*../*" OR param="*..%2f*")

🔗 References

📤 Share & Export