RULE(RULE ID:330066)

Rule General Information
Release Date: 2020-04-29
Rule Name: rConfig v3.9.3 Authenticated Remote Code Execution Vulnerability (CVE-2019-19509)
Severity:
CVE ID:
Rule Protection Details
Description: An issue was discovered in rConfig 3.9.3. A remote authenticated user can directly execute system commands by sending a GET request to ajaxArchiveFiles.php because the path parameter is passed to the exec function without filtering, which can lead to command execution.
Impact: An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software.
Affected OS: Linux, Other Unix
Reference: http://packetstormsecurity.com/files/156146/rConfig-3.9.3-Remote-Code-Execution.html
http://packetstormsecurity.com/files/156766/Rconfig-3.x-Chained-Remote-Code-Execution.html
http://packetstormsecurity.com/files/156950/rConfig-3.9.4-searchField-Remote-Code-Execution.html
https://github.com/v1k1ngfr
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://rconfig.com/