Vulnerability Description
rConfig before 3.9.5 allows command injection by sending a crafted GET request to lib/crud/search.crud.php since the nodeId parameter is passed directly to the exec function without being escaped.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rconfig | Rconfig | < 3.9.5 |
Related Weaknesses (CWE)
References
- https://github.com/rconfig/rconfig/commit/3385f906427d228c48b914625136bf620f4ca0Patch
- https://www.exploit-db.com/exploits/48241ExploitThird Party AdvisoryVDB Entry
- https://github.com/rconfig/rconfig/commit/3385f906427d228c48b914625136bf620f4ca0Patch
- https://www.exploit-db.com/exploits/48241ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2020-10879?
CVE-2020-10879 is a vulnerability with a CVSS score of 9.8 (CRITICAL). rConfig before 3.9.5 allows command injection by sending a crafted GET request to lib/crud/search.crud.php since the nodeId parameter is passed directly to the exec function without being escaped.
How severe is CVE-2020-10879?
CVE-2020-10879 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-10879?
Check the references section above for vendor advisories and patch information. Affected products include: Rconfig Rconfig.