vendor:
rConfig
by:
Askar
9.8
CVSS
CRITICAL
Remote Code Execution
78
CWE
Product Name: rConfig
Affected Version From: 3.9.2
Affected Version To: 3.9.2
Patch Exists: YES
Related CWE: CVE-2019-16662
CPE: a:rconfig:rconfig
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: CentOS 7.7 / PHP 7.2.22
2019
rConfig 3.9.2 – Remote Code Execution
rConfig is a web-based network device configuration management application. A vulnerability in rConfig 3.9.2 allows an unauthenticated attacker to execute arbitrary code on the target system. This is due to the lack of input validation in the 'rootUname' parameter of the 'ajaxServerSettingsChk.php' script, which is accessible through the '/install/lib/ajaxHandlers/' directory. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious code to the vulnerable server. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the target system.
Mitigation:
Upgrade to rConfig version 3.9.3 or later.