First published: Mon Oct 19 2020(Updated: )
rConfig 3.9.4 and earlier allows authenticated code execution (of system commands) by sending a forged GET request to lib/ajaxHandlers/ajaxAddTemplate.php or lib/ajaxHandlers/ajaxEditTemplate.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | <=3.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-13778 is critical with a severity value of 8.8.
CVE-2020-13778 allows authenticated code execution (of system commands) in rConfig 3.9.4 and earlier.
rConfig versions up to and including 3.9.4 are affected by CVE-2020-13778.
An attacker can exploit CVE-2020-13778 by sending a forged GET request to lib/ajaxHandlers/ajaxAddTemplate.php or lib/ajaxHandlers/ajaxEditTemplate.php.
Yes, you can find additional information about CVE-2020-13778 at the following references: - https://cxsecurity.com/issue/WLB-2020100091 - https://github.com/theguly/exploits/blob/master/CVE-2020-13778.py - https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/