vendor:
rConfig
by:
mhaskar, bcoles
9.8
CVSS
CRITICAL
Command Injection
78
CWE
Product Name: rConfig
Affected Version From: 3.9.2002
Affected Version To: 3.9.2002
Patch Exists: NO
Related CWE: CVE-2019-16662
CPE: a:rconfig_project:rconfig:3.9.2
Tags: intrusive,rconfig,packetstorm,cve,cve2019,rce
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://shells.systems/rconfig-v3-9-2-authenticated-and-unauthenticated-rce-cve-2019-16663-and-cve-2019-16662/, https://nvd.nist.gov/vuln/detail/CVE-2019-16662, https://drive.google.com/open?id=1OXI5cNuwWqc6y-7BgNCfYHgFPK2cpvnu, http://packetstormsecurity.com/files/154999/rConfig-3.9.2-Remote-Code-Execution.html, http://packetstormsecurity.com/files/155186/rConfig-3.9.2-Command-Injection.html
Nuclei Metadata: {'max-request': 1, 'vendor': 'rconfig', 'product': 'rconfig'}
Platforms Tested: Unix, Linux
2019
rConfig install Command Execution
This module exploits an unauthenticated command injection vulnerability in rConfig versions 3.9.2 and prior. The 'install' directory is not automatically removed after installation, allowing unauthenticated users to execute arbitrary commands via the 'ajaxServerSettingsChk.php' file as the web server user. This module has been tested successfully on rConfig version 3.9.2 on CentOS 7.7.1908 (x64).
Mitigation:
Upgrade to a patched version of rConfig.