Show filters
46 Total Results
Displaying 1-10 of 46
Sort by:
Attacker Value
Very High

CVE-2020-10220

Disclosure Date: March 07, 2020 (last updated February 21, 2025)
An issue was discovered in rConfig through 3.9.4. The web interface is prone to a SQL injection via the commands.inc.php searchColumn parameter.
Attacker Value
Very High

CVE-2019-16662

Disclosure Date: October 28, 2019 (last updated November 27, 2024)
An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution.
Attacker Value
Very High

CVE-2020-10548

Disclosure Date: June 04, 2020 (last updated February 21, 2025)
rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
Attacker Value
Very High

CVE-2020-10546

Disclosure Date: June 04, 2020 (last updated February 21, 2025)
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicies.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
Attacker Value
Very High

CVE-2020-10547

Disclosure Date: June 04, 2020 (last updated February 21, 2025)
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicyelements.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
Attacker Value
Very High

CVE-2020-10549

Disclosure Date: June 04, 2020 (last updated February 21, 2025)
rConfig 3.9.4 and previous versions has unauthenticated snippets.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
Attacker Value
Moderate

CVE-2019-19585

Disclosure Date: August 08, 2019 (last updated February 21, 2025)
An issue was discovered in rConfig 3.9.3. The install script updates the /etc/sudoers file for rconfig specific tasks. After an "rConfig specific Apache configuration" update, apache has high privileges for some binaries. This can be exploited by an attacker to bypass local security restrictions.
Attacker Value
Unknown

CVE-2024-53849

Disclosure Date: November 27, 2024 (last updated December 21, 2024)
editorconfig-core-c is theEditorConfig core library written in C (for use by plugins supporting EditorConfig parsing). In affected versions several overflows may occur in switch case '[' when the input pattern contains many escaped characters. The added backslashes leave too little space in the output pattern when processing nested brackets such that the remaining input length exceeds the output capacity. This issue has been addressed in release version 0.12.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
0
Attacker Value
Unknown

CVE-2023-39110

Disclosure Date: August 01, 2023 (last updated October 08, 2023)
rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path parameter at /ajaxGetFileByPath.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.
Attacker Value
Unknown

CVE-2023-39109

Disclosure Date: August 01, 2023 (last updated October 08, 2023)
rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path_a parameter in the doDiff Function of /classes/compareClass.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.