
Cloud Vulnerability DB
A community-led vulnerabilities database
Directory Traversal vulnerability was discovered in Pfsense v.2.1.3 and Pfsense Suricata v.1.4.6 pkg v.1.0.1. The vulnerability allows remote attackers to obtain sensitive information via the file parameter to suricata/suricatalogsbrowser.php (NVD).
The vulnerability is classified as a Directory Traversal (CWE-22) with a CVSS v3.1 Base Score of 7.5 HIGH (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The issue exists in the file parameter handling of suricatalogsbrowser.php, where insufficient validation allows traversal outside the intended directory structure (Pastebin).
The vulnerability allows attackers to read arbitrary files on the server through the web browser. This includes access to sensitive system files such as /etc/master.passwd, potentially exposing critical system information and credentials (Pastebin).
A patch was released that fixes the file browser vulnerability in the LOGS BROWSER tab. The fix includes proper validation of file paths and is available through a security update (Github Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."