CVE-2020-25351
- EPSS 0.06%
- Veröffentlicht 20.08.2021 19:15:08
- Zuletzt bearbeitet 21.11.2024 05:17:53
An information disclosure vulnerability in rConfig 3.9.5 has been fixed for version 3.9.6. This vulnerability allowed remote authenticated attackers to read files on the system via a crafted request sent to to the /lib/crud/configcompare.crud.php scr...
CVE-2020-25352
- EPSS 2.35%
- Veröffentlicht 20.08.2021 19:15:08
- Zuletzt bearbeitet 21.11.2024 05:17:53
A stored cross-site scripting (XSS) vulnerability in the /devices.php function inrConfig 3.9.5 has been fixed for version 3.9.6. This vulnerability allowed remote attackers to perform arbitrary Javascript execution through entering a crafted payload ...
CVE-2020-25353
- EPSS 0.05%
- Veröffentlicht 20.08.2021 19:15:08
- Zuletzt bearbeitet 21.11.2024 05:17:53
A server-side request forgery (SSRF) vulnerability in rConfig 3.9.5 has been fixed for 3.9.6. This vulnerability allowed remote authenticated attackers to open a connection to the machine via the deviceIpAddr and connPort parameters.
CVE-2020-25359
- EPSS 1.42%
- Veröffentlicht 20.08.2021 19:15:08
- Zuletzt bearbeitet 21.11.2024 05:17:53
An arbitrary file deletion vulnerability in rConfig 3.9.5 has been fixed for 3.9.6. This vulnerability gave attackers the ability to send a crafted request to /lib/ajaxHandlers/ajaxDeleteAllLoggingFiles.php by specifying a path in the path parameter ...
CVE-2020-27466
- EPSS 3.72%
- Veröffentlicht 20.08.2021 19:15:08
- Zuletzt bearbeitet 21.11.2024 05:21:14
An arbitrary file write vulnerability in lib/AjaxHandlers/ajaxEditTemplate.php of rConfig 3.9.6 allows attackers to execute arbitrary code via a crafted file.
CVE-2020-23151
- EPSS 53.06%
- Veröffentlicht 09.08.2021 23:15:06
- Zuletzt bearbeitet 21.11.2024 05:13:36
rConfig 3.9.5 allows command injection by sending a crafted GET request to lib/ajaxHandlers/ajaxArchiveFiles.php since the path parameter is passed directly to the exec function without being escaped.
CVE-2020-23150
- EPSS 0.14%
- Veröffentlicht 09.08.2021 23:15:06
- Zuletzt bearbeitet 21.11.2024 05:13:36
A SQL injection vulnerability in config.inc.php of rConfig 3.9.5 allows attackers to access sensitive database information via a crafted GET request to install/lib/ajaxHandlers/ajaxDbInstall.php.
CVE-2020-23149
- EPSS 0.14%
- Veröffentlicht 09.08.2021 23:15:06
- Zuletzt bearbeitet 21.11.2024 05:13:36
The dbName parameter in ajaxDbInstall.php of rConfig 3.9.5 is unsanitized, allowing attackers to perform a SQL injection and access sensitive database information.
CVE-2020-23148
- EPSS 0.15%
- Veröffentlicht 09.08.2021 23:15:06
- Zuletzt bearbeitet 21.11.2024 05:13:36
The userLogin parameter in ldap/login.php of rConfig 3.9.5 is unsanitized, allowing attackers to perform a LDAP injection and obtain sensitive information via a crafted POST request.
CVE-2020-13638
- EPSS 92.2%
- Veröffentlicht 13.11.2020 20:15:16
- Zuletzt bearbeitet 21.11.2024 05:01:39
lib/crud/userprocess.php in rConfig 3.9.x before 3.9.7 has an authentication bypass, leading to administrator account creation. This issue has been fixed in 3.9.7.