CVE-2020-12255
- EPSS 58.58%
- Veröffentlicht 18.05.2020 15:15:10
- Zuletzt bearbeitet 21.11.2024 04:59:23
rConfig 3.9.4 is vulnerable to remote code execution due to improper validation in the file upload functionality. vendor.crud.php accepts a file upload by checking content-type without considering the file extension and header. Thus, an attacker can ...
CVE-2020-12257
- EPSS 0.57%
- Veröffentlicht 18.05.2020 14:15:11
- Zuletzt bearbeitet 21.11.2024 04:59:23
rConfig 3.9.4 is vulnerable to cross-site request forgery (CSRF) because it lacks implementation of CSRF protection such as a CSRF token. An attacker can leverage this vulnerability by creating a form (add a user, delete a user, or edit a user).
CVE-2020-12258
- EPSS 1.06%
- Veröffentlicht 18.05.2020 14:15:11
- Zuletzt bearbeitet 21.11.2024 04:59:23
rConfig 3.9.4 is vulnerable to session fixation because session expiry and randomization are mishandled. The application can reuse a session via PHPSESSID. Also, an attacker can exploit this vulnerability in conjunction with CVE-2020-12256 or CVE-202...
CVE-2020-12259
- EPSS 68.31%
- Veröffentlicht 18.05.2020 13:15:10
- Zuletzt bearbeitet 21.11.2024 04:59:23
rConfig 3.9.4 is vulnerable to reflected XSS. The configDevice.php file improperly validates user input. An attacker can exploit this vulnerability by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php.
CVE-2020-10879
- EPSS 86.18%
- Veröffentlicht 23.03.2020 22:15:12
- Zuletzt bearbeitet 21.11.2024 04:56:16
rConfig before 3.9.5 allows command injection by sending a crafted GET request to lib/crud/search.crud.php since the nodeId parameter is passed directly to the exec function without being escaped.
CVE-2020-9425
- EPSS 49.45%
- Veröffentlicht 20.03.2020 18:15:14
- Zuletzt bearbeitet 21.11.2024 05:40:36
An issue was discovered in includes/head.inc.php in rConfig before 3.9.4. An unauthenticated attacker can retrieve saved cleartext credentials via a GET request to settings.php. Because the application was not exiting after a redirect is applied, the...
- EPSS 91.39%
- Veröffentlicht 08.03.2020 22:15:11
- Zuletzt bearbeitet 07.11.2025 19:33:35
lib/ajaxHandlers/ajaxAddTemplate.php in rConfig through 3.94 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the fileName POST parameter.
CVE-2020-10220
- EPSS 94.02%
- Veröffentlicht 07.03.2020 23:15:11
- Zuletzt bearbeitet 21.11.2024 04:54:59
An issue was discovered in rConfig through 3.9.4. The web interface is prone to a SQL injection via the commands.inc.php searchColumn parameter.
CVE-2019-19585
- EPSS 0.19%
- Veröffentlicht 06.01.2020 20:15:12
- Zuletzt bearbeitet 21.11.2024 04:34:59
An issue was discovered in rConfig 3.9.3. The install script updates the /etc/sudoers file for rconfig specific tasks. After an "rConfig specific Apache configuration" update, apache has high privileges for some binaries. This can be exploited by an ...
- EPSS 92%
- Veröffentlicht 06.01.2020 20:15:12
- Zuletzt bearbeitet 21.11.2024 04:34:51
An issue was discovered in rConfig 3.9.3. A remote authenticated user can directly execute system commands by sending a GET request to ajaxArchiveFiles.php because the path parameter is passed to the exec function without filtering, which can lead to...