#VU26097 OS Command Injection in rConfig - CVE-2019-19509
Published: March 16, 2020 / Updated: June 17, 2021
rConfig
rConfig
Description
The vulnerability allows a remote user to execute arbitrary shell commands on the target system.
The vulnerability exists due to absent filtration of user-supplied data passed to ajaxArchiveFiles.php script. A remote authenticated user can send a specially crafted HTTP GET request to the affected script and execute arbitrary OS commands on the target system.