First published: Tue Jul 28 2020(Updated: )
rConfig 3.9.5 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a crafted request to the ajaxGetFileByPath.php script containing hexadecimal encoded "dot dot" sequences (%2f..%2f) in the path parameter to view arbitrary files on the system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | =3.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-15712 is medium with a severity value of 4.3.
CVE-2020-15712 affects rConfig version 3.9.5.
CVE-2020-15712 is classified under CWE-22 (Path Traversal).
An attacker can exploit CVE-2020-15712 by sending a crafted request to the ajaxGetFileByPath.php script with hexadecimal encoded "dot dot" sequences in the path parameter.
Yes, you can find more information about CVE-2020-15712 at the following references: [Reference 1](https://exchange.xforce.ibmcloud.com/vulnerabilities/184938) and [Reference 2](https://www.rconfig.com/downloads/v3-release-notes).