CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/exploit/unix/http/pfsense_clickjacking.md
Views: 11788

Vulnerable Application

This vulnerability affects any pfSense versions prior to 2.4.2-RELEASE.

Vulnerable Setup

The victim should be able to access the WebGUI & must be logged in as admin in order for this exploit to work. Possibly the WebGUI's TLS certificate must be trusted in the browser.

Verification Steps

  1. use exploit/unix/http/pfsense_clickjacking

  2. set TARGETURI https://<ip WebGUI>

  3. exploit

  4. Browse to the URL returned by MSF

  5. Click anywhere on the returned page

  6. Note that a new Meterpreter sessions was started.

Options

TARGETURI

The base path of the WebGUI. The default base path is https://192.168.1.1/