First published: Tue Jul 28 2020(Updated: )
rConfig 3.9.5 is vulnerable to SQL injection. A remote authenticated attacker could send crafted SQL statements to the devices.crud.php script using the custom_Location parameter, which could allow the attacker to view, add, modify, or delete information in the back-end database.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | =3.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15714 is a vulnerability in rConfig 3.9.5 that allows remote authenticated attackers to perform SQL injection.
CVE-2020-15714 affects rConfig 3.9.5 and allows remote authenticated attackers to send crafted SQL statements to the devices.crud.php script.
CVE-2020-15714 has a severity rating of 8.8 (high).
An attacker can exploit CVE-2020-15714 by sending crafted SQL statements to the devices.crud.php script using the custom_Location parameter.
The rConfig team has released version 3.9.6, which fixes the SQL injection vulnerability (CVE-2020-15714). It is recommended to upgrade to this version.