First published: Fri Aug 20 2021(Updated: )
An insecure update feature in the /updater.php component of rConfig 3.9.6 and below allows attackers to execute arbitrary code via a crafted ZIP file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | <=3.9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-27464.
The title of the vulnerability is 'An insecure update feature in the /updater.php component of rConfig 3.9.6 and below allows attackers...'
The severity of CVE-2020-27464 is high with a CVSS score of 7.8.
An attacker can exploit CVE-2020-27464 by using a crafted ZIP file to execute arbitrary code via the insecure update feature in the /updater.php component of rConfig 3.9.6 and below.
Yes, upgrading rConfig to a version above 3.9.6 will fix the vulnerability.