vendor:
rConfig
by:
5a65726f
7.5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: rConfig
Affected Version From: rConfig v3.9.6
Affected Version To: rConfig v3.9.6
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: centOS 7
2021
rConfig 3.9.6 – ‘path’ Local File Inclusion (Authenticated)
rConfig, the open source network device configuration management tool, is vulnerable to local file inclusion in /lib/ajaxHandlers/ajaxGetFileByPath.php with parameter path. ajaxGetFileByPath.php allows authenticated users to download any file on the server. The following steps can be carried out in duplicating this vulnerability: Login the rConfig application with your credentials and enter the following link to your browser: http(s)://<SERVER>/lib/ajaxHandlers/ajaxGetFileByPath.php?path=../../../../../../etc/passwd
Mitigation:
Restrict access to the vulnerable file, and ensure that the application is running with the least privileges necessary.