#VU22514 OS Command Injection in rConfig - CVE-2019-16662
Published: November 5, 2019 / Updated: June 17, 2021
rConfig
rConfig
Description
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to the "rootUname" parameter is passed to the "exec" function without filtering. A remote unauthenticated attacker can send a specially crafted GET request to "ajaxServerSettingsChk.php" file and execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- https://drive.google.com/file/d/1bTpTn4-alJ8qGCEATLq-oVM6HbhE65iY/view?usp=sharing
- https://drive.google.com/open?id=1OXI5cNuwWqc6y-7BgNCfYHgFPK2cpvnu
- https://gist.github.com/mhaskar/ceb65fa4ca57c3cdccc1edfe2390902e
- https://rconfig.com/download
- https://threatpost.com/critical-rce-flaw-in-rconfig/149847
- https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/unix/webapp/rconfig_inst...