RULE(RULE ID:324410)

Rule General Information
Release Date: 2020-03-25
Rule Name: rConfig HTTP ajaxArchiveFiles OS Command Injection Vulnerability (CVE-2019-19509)
Severity:
CVE ID:
Rule Protection Details
Description: An issue was discovered in rConfig 3.9.3. A remote authenticated user can directly execute system commands by sending a GET request to ajaxArchiveFiles.php because the path parameter is passed to the exec function without filtering, which can lead to command execution.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Others
Reference: http://packetstormsecurity.com/files/156146/rConfig-3.9.3-Remote-Code-Execution.html
http://packetstormsecurity.com/files/156766/Rconfig-3.x-Chained-Remote-Code-Execution.html
https://github.com/v1k1ngfr
https://github.com/v1k1ngfr/exploits-rconfig/blob/master/rconfig_CVE-2019-19509.py
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://rconfig.com/