7.5
CWE
22
Advisory Published
Updated

CVE-2019-19372: Path Traversal

First published: Thu Nov 28 2019(Updated: )

** DISPUTED ** A downloadFile.php download_file path traversal vulnerability in rConfig through 3.9.3 allows attackers to list files in arbitrary folders and potentially download files. NOTE: the discoverer later reported that there was not a "fully working exploit."

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
rConfig rConfig<=3.9.3
<=3.9.3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2019-19372?

    CVE-2019-19372 is a download_file path traversal vulnerability in rConfig through version 3.9.3.

  • What is the severity of CVE-2019-19372?

    The severity of CVE-2019-19372 is high with a CVSS score of 7.5.

  • How does CVE-2019-19372 affect rConfig?

    CVE-2019-19372 allows attackers to list files in arbitrary folders and potentially download files in rConfig.

  • Is there a fully working exploit for CVE-2019-19372?

    No, the discoverer reported that there was not a fully working exploit for CVE-2019-19372.

  • How can I fix CVE-2019-19372?

    Upgrade rConfig to a version beyond 3.9.3 to fix CVE-2019-19372.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203