RULE(RULE ID:323926)

Rule General Information
Release Date: 2021-06-01
Rule Name: rConfig ajaxServerSettingsChk.php Command Injection Vulnerability (CVE-2019-16662)
Severity:
CVE ID:
Rule Protection Details
Description: An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference: http://packetstormsecurity.com/files/154999/rConfig-3.9.2-Remote-Code-Execution.html
http://packetstormsecurity.com/files/155186/rConfig-3.9.2-Command-Injection.html
https://drive.google.com/file/d/1bTpTn4-alJ8qGCEATLq-oVM6HbhE65iY/view?usp=sharing
https://drive.google.com/open?id=1OXI5cNuwWqc6y-7BgNCfYHgFPK2cpvnu
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://rconfig.com