rConfig 3.9.5

CPE Details

rConfig 3.9.5
3.9.5
2020-03-24
16h45 +00:00
2020-03-24
16h45 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:rconfig:rconfig:3.9.5:*:*:*:*:*:*:*

Informations

Vendor

rconfig

Product

rconfig

Version

3.9.5

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-27464 2021-08-20 16h10 +00:00 An insecure update feature in the /updater.php component of rConfig 3.9.6 and below allows attackers to execute arbitrary code via a crafted ZIP file.
7.8
High
CVE-2020-25359 2021-08-20 16h10 +00:00 An arbitrary file deletion vulnerability in rConfig 3.9.5 has been fixed for 3.9.6. This vulnerability gave attackers the ability to send a crafted request to /lib/ajaxHandlers/ajaxDeleteAllLoggingFiles.php by specifying a path in the path parameter and an extension in the ext parameter and delete all the files with that extension in that path.
9.1
Critical
CVE-2020-25353 2021-08-20 16h10 +00:00 A server-side request forgery (SSRF) vulnerability in rConfig 3.9.5 has been fixed for 3.9.6. This vulnerability allowed remote authenticated attackers to open a connection to the machine via the deviceIpAddr and connPort parameters.
6.5
Medium
CVE-2020-25352 2021-08-20 16h10 +00:00 A stored cross-site scripting (XSS) vulnerability in the /devices.php function inrConfig 3.9.5 has been fixed for version 3.9.6. This vulnerability allowed remote attackers to perform arbitrary Javascript execution through entering a crafted payload into the 'Model' field then saving.
5.4
Medium
CVE-2020-25351 2021-08-20 16h10 +00:00 An information disclosure vulnerability in rConfig 3.9.5 has been fixed for version 3.9.6. This vulnerability allowed remote authenticated attackers to read files on the system via a crafted request sent to to the /lib/crud/configcompare.crud.php script.
6.5
Medium
CVE-2020-23151 2021-08-09 20h54 +00:00 rConfig 3.9.5 allows command injection by sending a crafted GET request to lib/ajaxHandlers/ajaxArchiveFiles.php since the path parameter is passed directly to the exec function without being escaped.
9.8
Critical
CVE-2020-23150 2021-08-09 20h54 +00:00 A SQL injection vulnerability in config.inc.php of rConfig 3.9.5 allows attackers to access sensitive database information via a crafted GET request to install/lib/ajaxHandlers/ajaxDbInstall.php.
7.5
High
CVE-2020-23149 2021-08-09 20h54 +00:00 The dbName parameter in ajaxDbInstall.php of rConfig 3.9.5 is unsanitized, allowing attackers to perform a SQL injection and access sensitive database information.
7.5
High
CVE-2020-23148 2021-08-09 20h54 +00:00 The userLogin parameter in ldap/login.php of rConfig 3.9.5 is unsanitized, allowing attackers to perform a LDAP injection and obtain sensitive information via a crafted POST request.
7.5
High
CVE-2020-13638 2020-11-13 18h53 +00:00 lib/crud/userprocess.php in rConfig 3.9.x before 3.9.7 has an authentication bypass, leading to administrator account creation. This issue has been fixed in 3.9.7.
9.8
Critical
CVE-2020-15715 2020-07-28 11h04 +00:00 rConfig 3.9.5 could allow a remote authenticated attacker to execute arbitrary code on the system, because of an error in the search.crud.php script. An attacker could exploit this vulnerability using the nodeId parameter.
9.9
Critical
CVE-2020-15714 2020-07-28 11h03 +00:00 rConfig 3.9.5 is vulnerable to SQL injection. A remote authenticated attacker could send crafted SQL statements to the devices.crud.php script using the custom_Location parameter, which could allow the attacker to view, add, modify, or delete information in the back-end database.
8.8
High
CVE-2020-15713 2020-07-28 11h03 +00:00 rConfig 3.9.5 is vulnerable to SQL injection. A remote authenticated attacker could send crafted SQL statements to the devices.php script using the sortBy parameter, which could allow the attacker to view, add, modify, or delete information in the back-end database.
8.8
High
CVE-2020-15712 2020-07-28 11h03 +00:00 rConfig 3.9.5 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a crafted request to the ajaxGetFileByPath.php script containing hexadecimal encoded "dot dot" sequences (%2f..%2f) in the path parameter to view arbitrary files on the system.
4.3
Medium