RULE(RULE ID:324354)

Rule General Information
Release Date: 2020-02-20
Rule Name: rConfig Unauthenticated RCE Vulnerability (CVE-2019-16662)
Severity:
CVE ID:
Rule Protection Details
Description: An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Linux
Reference: http://packetstormsecurity.com/files/154999/rConfig-3.9.2-Remote-Code-Execution.html
http://packetstormsecurity.com/files/155186/rConfig-3.9.2-Command-Injection.html
https://drive.google.com/file/d/1bTpTn4-alJ8qGCEATLq-oVM6HbhE65iY/view?usp=sharing
https://drive.google.com/open?id=1OXI5cNuwWqc6y-7BgNCfYHgFPK2cpvnu
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://rconfig.com