Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown

CVE-2023-39110

Disclosure Date: August 01, 2023 (last updated October 08, 2023)
rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path parameter at /ajaxGetFileByPath.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.
Attacker Value
Unknown

CVE-2023-39109

Disclosure Date: August 01, 2023 (last updated October 08, 2023)
rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path_a parameter in the doDiff Function of /classes/compareClass.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.
Attacker Value
Unknown

CVE-2023-39108

Disclosure Date: August 01, 2023 (last updated October 08, 2023)
rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path_b parameter in the doDiff Function of /classes/compareClass.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.
Attacker Value
Unknown

CVE-2020-12255

Disclosure Date: May 18, 2020 (last updated February 21, 2025)
rConfig 3.9.4 is vulnerable to remote code execution due to improper validation in the file upload functionality. vendor.crud.php accepts a file upload by checking content-type without considering the file extension and header. Thus, an attacker can exploit this by uploading a .php file to vendor.php that contains arbitrary PHP code and changing the content-type to image/gif.
Attacker Value
Unknown

CVE-2020-12256

Disclosure Date: May 18, 2020 (last updated February 21, 2025)
rConfig 3.9.4 is vulnerable to reflected XSS. The devicemgmnt.php file improperly validates user input. An attacker can exploit this by crafting arbitrary JavaScript in the deviceId GET parameter to devicemgmnt.php.
Attacker Value
Unknown

CVE-2020-12258

Disclosure Date: May 18, 2020 (last updated February 21, 2025)
rConfig 3.9.4 is vulnerable to session fixation because session expiry and randomization are mishandled. The application can reuse a session via PHPSESSID. Also, an attacker can exploit this vulnerability in conjunction with CVE-2020-12256 or CVE-2020-12259.
Attacker Value
Unknown

CVE-2020-12257

Disclosure Date: May 18, 2020 (last updated February 21, 2025)
rConfig 3.9.4 is vulnerable to cross-site request forgery (CSRF) because it lacks implementation of CSRF protection such as a CSRF token. An attacker can leverage this vulnerability by creating a form (add a user, delete a user, or edit a user).
Attacker Value
Unknown

CVE-2020-12259

Disclosure Date: May 18, 2020 (last updated February 21, 2025)
rConfig 3.9.4 is vulnerable to reflected XSS. The configDevice.php file improperly validates user input. An attacker can exploit this vulnerability by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php.