First published: Tue Aug 01 2023(Updated: )
rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path parameter at /ajaxGetFileByPath.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | =3.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39110 refers to a Server-Side Request Forgery (SSRF) vulnerability in rconfig v3.9.4.
The vulnerability allows authenticated attackers to make arbitrary requests by injecting crafted URLs through the path parameter in /ajaxGetFileByPath.php.
The severity of CVE-2023-39110 is high with a CVSS score of 8.8.
rconfig v3.9.4 is affected by CVE-2023-39110.
To fix CVE-2023-39110, it is recommended to update rconfig to a version that addresses the SSRF vulnerability.