First published: Fri Aug 20 2021(Updated: )
A server-side request forgery (SSRF) vulnerability in rConfig 3.9.5 has been fixed for 3.9.6. This vulnerability allowed remote authenticated attackers to open a connection to the machine via the deviceIpAddr and connPort parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | =3.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the SSRF vulnerability in rConfig is CVE-2020-25353.
The severity of CVE-2020-25353 is medium with a CVSS score of 6.5.
The SSRF vulnerability in rConfig 3.9.5 allows remote authenticated attackers to open a connection to the system via the deviceIpAddr and connPort parameters.
The SSRF vulnerability in rConfig 3.9.5 has been fixed in version 3.9.6.
You can find more information about the SSRF vulnerability in rConfig at this link: https://stark0de.com/2020/08/27/pwning-rconfig-part-one.html