First published: Mon Oct 28 2019(Updated: )
An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to search.crud.php because the catCommand parameter is passed to the exec function without filtering, which can lead to command execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | =3.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16663 is a vulnerability in rConfig 3.9.2 that allows an attacker to directly execute system commands by sending a GET request to search.crud.php.
CVE-2019-16663 has a severity level of 8.8 (critical).
CVE-2019-16663 affects rConfig 3.9.2 by allowing an attacker to execute system commands through the catCommand parameter in search.crud.php.
CVE-2019-16663 can be exploited by sending a GET request to search.crud.php with a malicious catCommand parameter.
Yes, there is a fix available for CVE-2019-16663. It is recommended to update rConfig to the latest version to mitigate the vulnerability.