CVE-2019-16662 Scanner
CVE-2019-16662 scanner - OS Command Injection vulnerability in rConfig
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
15 seconds
Time Interval
29 days
Scan only one
URL
Toolbox
-
rConfig is an open-source network configuration management tool that is used for managing network devices and monitoring configurations. It is designed to simplify the management of networking devices by providing an automated configuration process. The tool can be useful for system administrators, network engineers, and security analysts who are responsible for managing devices in a network.
Recently, a vulnerability named CVE-2019-16662 was discovered in rConfig 3.9.2. This vulnerability can allow attackers to execute system commands by sending a GET request to ajaxServerSettingsChk.php. The rootUname parameter is passed to the exec function without filtering, which enables attackers to execute command code on the system.
When the CVE-2019-16662 vulnerability is exploited, it can lead to significant security risks. Attackers can gain unauthorized access, control system settings, and access sensitive information. They can manipulate configurations and deploy malware on the system. Additionally, they can disrupt network operations and cause downtime, leading to financial losses and reputational damage.
At s4e.io, we offer pro features that can help you quickly and easily identify vulnerabilities in your digital assets. With our platform, you can stay ahead of potential security risks and protect your systems from unwanted attacks. Our team of security experts is always available to help you with any security concerns you may have. Stay safe and secure with s4e.io.
REFERENCES
- http://packetstormsecurity.com/files/154999/rConfig-3.9.2-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/155186/rConfig-3.9.2-Command-Injection.html
- https://drive.google.com/file/d/1bTpTn4-alJ8qGCEATLq-oVM6HbhE65iY/view?usp=sharing
- https://drive.google.com/open?id=1OXI5cNuwWqc6y-7BgNCfYHgFPK2cpvnu
- https://gist.github.com/mhaskar/ceb65fa4ca57c3cdccc1edfe2390902e
- https://rconfig.com/download
- https://shells.systems/rconfig-v3-9-2-authenticated-and-unauthenticated-rce-cve-2019-16663-and-cve-2019-16662/