Insufficiently protected credentials in rConfig - CVE-2020-9425

 

Insufficiently protected credentials in rConfig - CVE-2020-9425

Published: March 20, 2020 / Updated: July 17, 2020


Vulnerability identifier: #VU30327
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2020-9425
CWE-ID: CWE-522
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: rConfig
Affected software:
rConfig

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

An issue was discovered in includes/head.inc.php in rConfig before 3.9.4. An unauthenticated attacker can retrieve saved cleartext credentials via a GET request to settings.php. Because the application was not exiting after a redirect is applied, the rest of the page still executed, resulting in the disclosure of cleartext credentials in the response.


How to mitigate CVE-2020-9425

Install update from vendor's website.

Sources