vendor:
rConfig
by:
Murat ŞEKER
9.8
CVSS
HIGH
Arbitrary File Upload to Remote Code Execution
78
CWE
Product Name: rConfig
Affected Version From: rConfig v3.9.6
Affected Version To: rConfig v3.9.6
Patch Exists: NO
Related CWE: N/A
CPE: rconfig
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: centOS 7
2021
rConfig 3.9.6 – Arbitrary File Upload to Remote Code Execution (Authenticated) (1)
rConfig, the open source network device configuration management tool, is vulnerable to Arbitrary File Upload to RCE in /lib/crud/vendors.crud.php with parameter 'vendorLogo'. The following steps can be carried out in duplicating this vulnerability: Login the rConfig application with your credentials, send a POST request to /lib/crud/vendors.crud.php, and access the uploaded file via the URL http://localhost/data/vendors/rce.php?cmd=whoami.
Mitigation:
Ensure that the application is configured to only accept files with the expected file extensions and that the application is configured to reject files with executable content.