Rconfig

Rconfig

44 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.06%
  • Veröffentlicht 20.08.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:17:53

An information disclosure vulnerability in rConfig 3.9.5 has been fixed for version 3.9.6. This vulnerability allowed remote authenticated attackers to read files on the system via a crafted request sent to to the /lib/crud/configcompare.crud.php scr...

Exploit
  • EPSS 2.35%
  • Veröffentlicht 20.08.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:17:53

A stored cross-site scripting (XSS) vulnerability in the /devices.php function inrConfig 3.9.5 has been fixed for version 3.9.6. This vulnerability allowed remote attackers to perform arbitrary Javascript execution through entering a crafted payload ...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 20.08.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:17:53

A server-side request forgery (SSRF) vulnerability in rConfig 3.9.5 has been fixed for 3.9.6. This vulnerability allowed remote authenticated attackers to open a connection to the machine via the deviceIpAddr and connPort parameters.

Exploit
  • EPSS 1.42%
  • Veröffentlicht 20.08.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:17:53

An arbitrary file deletion vulnerability in rConfig 3.9.5 has been fixed for 3.9.6. This vulnerability gave attackers the ability to send a crafted request to /lib/ajaxHandlers/ajaxDeleteAllLoggingFiles.php by specifying a path in the path parameter ...

  • EPSS 3.72%
  • Veröffentlicht 20.08.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:21:14

An arbitrary file write vulnerability in lib/AjaxHandlers/ajaxEditTemplate.php of rConfig 3.9.6 allows attackers to execute arbitrary code via a crafted file.

Exploit
  • EPSS 53.06%
  • Veröffentlicht 09.08.2021 23:15:06
  • Zuletzt bearbeitet 21.11.2024 05:13:36

rConfig 3.9.5 allows command injection by sending a crafted GET request to lib/ajaxHandlers/ajaxArchiveFiles.php since the path parameter is passed directly to the exec function without being escaped.

Exploit
  • EPSS 0.14%
  • Veröffentlicht 09.08.2021 23:15:06
  • Zuletzt bearbeitet 21.11.2024 05:13:36

A SQL injection vulnerability in config.inc.php of rConfig 3.9.5 allows attackers to access sensitive database information via a crafted GET request to install/lib/ajaxHandlers/ajaxDbInstall.php.

Exploit
  • EPSS 0.14%
  • Veröffentlicht 09.08.2021 23:15:06
  • Zuletzt bearbeitet 21.11.2024 05:13:36

The dbName parameter in ajaxDbInstall.php of rConfig 3.9.5 is unsanitized, allowing attackers to perform a SQL injection and access sensitive database information.

Exploit
  • EPSS 0.15%
  • Veröffentlicht 09.08.2021 23:15:06
  • Zuletzt bearbeitet 21.11.2024 05:13:36

The userLogin parameter in ldap/login.php of rConfig 3.9.5 is unsanitized, allowing attackers to perform a LDAP injection and obtain sensitive information via a crafted POST request.

Exploit
  • EPSS 92.2%
  • Veröffentlicht 13.11.2020 20:15:16
  • Zuletzt bearbeitet 21.11.2024 05:01:39

lib/crud/userprocess.php in rConfig 3.9.x before 3.9.7 has an authentication bypass, leading to administrator account creation. This issue has been fixed in 3.9.7.