First published: Mon Oct 28 2019(Updated: )
An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | =3.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue in rConfig 3.9.2 is CVE-2019-16662.
The severity of CVE-2019-16662 is critical with a CVSS score of 9.8.
An attacker can exploit CVE-2019-16662 by sending a GET request to ajaxServerSettingsChk.php with a malicious rootUname parameter, which allows for direct execution of system commands.
To mitigate the risk of CVE-2019-16662, it is recommended to update rConfig to a version that is not affected by this vulnerability and apply any patches or fixes provided by the vendor.
Yes, additional references related to CVE-2019-16662 can be found at the following URLs: [URL 1], [URL 2], [URL 3]