First published: Sun Mar 08 2020(Updated: )
lib/ajaxHandlers/ajaxAddTemplate.php in rConfig through 3.94 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the fileName POST parameter.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | <=3.9.4 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this rConfig vulnerability is CVE-2020-10221.
The title of this vulnerability is rConfig OS Command Injection Vulnerability.
The rConfig lib/ajaxHandlers/ajaxAddTemplate.php file contains an OS command injection vulnerability that allows remote attackers to execute OS commands by exploiting shell metacharacters in the fileName POST parameter.
The rConfig software, specifically versions up to and including 3.9.4, is affected by this vulnerability.
The severity of this vulnerability is critical with a CVSS score of 8.8.