#VU22514 OS Command Injection in rConfig - CVE-2019-16662

 

#VU22514 OS Command Injection in rConfig - CVE-2019-16662

Published: November 5, 2019 / Updated: June 17, 2021


Vulnerability identifier: #VU22514
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2019-16662
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
rConfig
Software vendor:
rConfig

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to the "rootUname" parameter is passed to the "exec" function without filtering. A remote unauthenticated attacker can send a specially crafted GET request to "ajaxServerSettingsChk.php" file and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links