FreeNAS 0.7.2 prior to revision 5543 includes an unauthenticated command‐execution backdoor in its web interface. The exec_raw.php script exposes a cmd parameter that is passed directly to the underlying shell without sanitation.CreditsMCReferenceshttps://www.exploit-db.com/exploits/16313https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/freenas_exec_raw.rbhttps://sourceforge.net/projects/freenas/https://github.com/freenashttps://www.truenas.com/freenas/https://www.tenable.com/plugins/nnm/5714https://web.archive.org/web/20101218143110/http://sourceforge.net/projects/freenas/files//stable/0.7.2/NOTES%200.7.2.5543.txt/viewhttps://www.vulncheck.com/advisories/freenas-arbitrary-command-execution