First published: Tue Aug 01 2023(Updated: )
rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path_b parameter in the doDiff Function of /classes/compareClass.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | =3.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39108 is a Server-Side Request Forgery (SSRF) vulnerability in rconfig v3.9.4.
The severity of CVE-2023-39108 is rated as high with a CVSS score of 8.8.
The vulnerability in CVE-2023-39108 allows authenticated attackers to perform server-side request forgery (SSRF) by injecting crafted URLs in the 'path_b' parameter in the 'doDiff' function of '/classes/compareClass.php'.
The CVE-2023-39108 vulnerability can be exploited by authenticated attackers who inject malicious URLs in the 'path_b' parameter, allowing them to make arbitrary requests.
At the time of this advisory, there is no known fix or patch available for CVE-2023-39108. It is recommended to monitor for any vendor updates or security advisories.