#VU26097 OS Command Injection in rConfig - CVE-2019-19509

 

#VU26097 OS Command Injection in rConfig - CVE-2019-19509

Published: March 16, 2020 / Updated: June 17, 2021


Vulnerability identifier: #VU26097
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Clear
CVE-ID: CVE-2019-19509
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
rConfig
Software vendor:
rConfig

Description

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to absent filtration of user-supplied data passed to ajaxArchiveFiles.php script. A remote authenticated user can send a specially crafted HTTP GET request to the affected script and execute arbitrary OS commands on the target system.



Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links