First published: Mon Jan 06 2020(Updated: )
An issue was discovered in rConfig 3.9.3. A remote authenticated user can directly execute system commands by sending a GET request to ajaxArchiveFiles.php because the path parameter is passed to the exec function without filtering, which can lead to command execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | =3.9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-19509 is critical with a CVSS score of 8.8.
A remote authenticated user can exploit CVE-2019-19509 by sending a GET request to ajaxArchiveFiles.php with a specially crafted path parameter to execute arbitrary system commands.
The affected software version of CVE-2019-19509 is rConfig 3.9.3.
Yes, there are fixes available for CVE-2019-19509. It is recommended to update to a patched version of rConfig.
Yes, additional information about CVE-2019-19509 can be found in the provided references.