First published: Tue Jul 28 2020(Updated: )
rConfig 3.9.5 is vulnerable to SQL injection. A remote authenticated attacker could send crafted SQL statements to the devices.php script using the sortBy parameter, which could allow the attacker to view, add, modify, or delete information in the back-end database.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | =3.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15713 is a vulnerability in rConfig 3.9.5 that allows a remote authenticated attacker to perform SQL injection.
An attacker can exploit CVE-2020-15713 by sending crafted SQL statements to the devices.php script using the sortBy parameter.
The severity of CVE-2020-15713 is high with a score of 8.8.
rConfig version 3.9.5 is affected by CVE-2020-15713.
Yes, you can find official references for CVE-2020-15713 at the following links: [link1](https://exchange.xforce.ibmcloud.com/vulnerabilities/184939), [link2](https://www.rconfig.com/downloads/v3-release-notes).