Vulnerability Description
rConfig 3.9.5 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a crafted request to the ajaxGetFileByPath.php script containing hexadecimal encoded "dot dot" sequences (%2f..%2f) in the path parameter to view arbitrary files on the system.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rconfig | Rconfig | 3.9.5 |
Related Weaknesses (CWE)
References
- https://exchange.xforce.ibmcloud.com/vulnerabilities/184938VDB Entry
- https://www.rconfig.com/downloads/v3-release-notesRelease NotesVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/184938VDB Entry
- https://www.rconfig.com/downloads/v3-release-notesRelease NotesVendor Advisory
FAQ
What is CVE-2020-15712?
CVE-2020-15712 is a vulnerability with a CVSS score of 4.3 (MEDIUM). rConfig 3.9.5 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a crafted request to the ajaxGetFileByPath.php script containing hexadecimal enc...
How severe is CVE-2020-15712?
CVE-2020-15712 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-15712?
Check the references section above for vendor advisories and patch information. Affected products include: Rconfig Rconfig.