First published: Mon May 18 2020(Updated: )
rConfig 3.9.4 is vulnerable to remote code execution due to improper validation in the file upload functionality. vendor.crud.php accepts a file upload by checking content-type without considering the file extension and header. Thus, an attacker can exploit this by uploading a .php file to vendor.php that contains arbitrary PHP code and changing the content-type to image/gif.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | =3.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for rConfig 3.9.4 is CVE-2020-12255.
The severity of CVE-2020-12255 is high with a CVSS score of 8.8.
rConfig 3.9.4 is affected by CVE-2020-12255.
CVE-2020-12255 is a vulnerability in rConfig 3.9.4 that allows remote code execution due to improper validation in the file upload functionality.
An attacker can exploit CVE-2020-12255 by uploading a malicious .php file through the vendor.crud.php file upload functionality.