First published: Mon May 18 2020(Updated: )
rConfig 3.9.4 is vulnerable to reflected XSS. The configDevice.php file improperly validates user input. An attacker can exploit this vulnerability by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | =3.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-12259.
The severity of CVE-2020-12259 is medium with a CVSS score of 5.4.
The affected software of CVE-2020-12259 is rConfig version 3.9.4.
CVE-2020-12259 is a reflected XSS vulnerability in rConfig 3.9.4, where the configDevice.php file does not properly validate user input in the rid GET parameter of devicemgmnt.php.
An attacker can exploit CVE-2020-12259 by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php.