Vulnerabilities (CVE)

Filtered by vendor Rconfig Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-25359 1 Rconfig 1 Rconfig 2022-07-10 6.4 MEDIUM 9.1 CRITICAL
An arbitrary file deletion vulnerability in rConfig 3.9.5 has been fixed for 3.9.6. This vulnerability gave attackers the ability to send a crafted request to /lib/ajaxHandlers/ajaxDeleteAllLoggingFiles.php by specifying a path in the path parameter and an extension in the ext parameter and delete all the files with that extension in that path.
CVE-2020-23151 1 Rconfig 1 Rconfig 2022-07-10 7.5 HIGH 9.8 CRITICAL
rConfig 3.9.5 allows command injection by sending a crafted GET request to lib/ajaxHandlers/ajaxArchiveFiles.php since the path parameter is passed directly to the exec function without being escaped.
CVE-2020-10549 1 Rconfig 1 Rconfig 2021-12-06 7.5 HIGH 9.8 CRITICAL
rConfig 3.9.4 and previous versions has unauthenticated snippets.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
CVE-2020-10548 1 Rconfig 1 Rconfig 2021-12-06 7.5 HIGH 9.8 CRITICAL
rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
CVE-2020-10547 1 Rconfig 1 Rconfig 2021-12-06 7.5 HIGH 9.8 CRITICAL
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicyelements.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
CVE-2020-10546 1 Rconfig 1 Rconfig 2021-12-06 7.5 HIGH 9.8 CRITICAL
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicies.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
CVE-2020-13638 1 Rconfig 1 Rconfig 2021-07-21 7.5 HIGH 9.8 CRITICAL
lib/crud/userprocess.php in rConfig 3.9.x before 3.9.7 has an authentication bypass, leading to administrator account creation. This issue has been fixed in 3.9.7.
CVE-2020-10879 1 Rconfig 1 Rconfig 2021-07-21 7.5 HIGH 9.8 CRITICAL
rConfig before 3.9.5 allows command injection by sending a crafted GET request to lib/crud/search.crud.php since the nodeId parameter is passed directly to the exec function without being escaped.
CVE-2020-15715 1 Rconfig 1 Rconfig 2020-07-28 6.5 MEDIUM 9.9 CRITICAL
rConfig 3.9.5 could allow a remote authenticated attacker to execute arbitrary code on the system, because of an error in the search.crud.php script. An attacker could exploit this vulnerability using the nodeId parameter.
CVE-2020-12258 1 Rconfig 1 Rconfig 2020-05-19 6.4 MEDIUM 9.1 CRITICAL
rConfig 3.9.4 is vulnerable to session fixation because session expiry and randomization are mishandled. The application can reuse a session via PHPSESSID. Also, an attacker can exploit this vulnerability in conjunction with CVE-2020-12256 or CVE-2020-12259.
CVE-2020-10220 1 Rconfig 1 Rconfig 2020-03-12 7.5 HIGH 9.8 CRITICAL
An issue was discovered in rConfig through 3.9.4. The web interface is prone to a SQL injection via the commands.inc.php searchColumn parameter.
CVE-2019-16662 1 Rconfig 1 Rconfig 2019-10-29 10.0 HIGH 9.8 CRITICAL
An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution.