CVE-2020-10879
rConfig vulnerability analysis and mitigation

Overview

rConfig before version 3.9.5 contains a command injection vulnerability identified as CVE-2020-10879. The vulnerability was discovered and disclosed on March 23, 2020, affecting the network configuration management software. The security flaw exists in the lib/crud/search.crud.php file, where the nodeId parameter is passed directly to the exec function without proper input validation or escaping (CVE-MITRE).

Technical details

The vulnerability stems from improper input validation in the search.crud.php file. Specifically, the nodeId parameter is passed directly to the exec function without any sanitization or escaping mechanisms, allowing attackers to inject and execute arbitrary system commands (EXPLOIT-DB).

Impact

When successfully exploited, this vulnerability allows attackers to execute arbitrary commands on the affected system through a crafted GET request. This can lead to complete system compromise, allowing attackers to gain unauthorized access and control over the affected rConfig installation (EXPLOIT-DB).

Mitigation and workarounds

The vulnerability has been patched in rConfig version 3.9.5. Users are strongly advised to upgrade to this version or later to protect against this security flaw. The fix can be found in the official repository commit that addresses the command injection vulnerability (GITHUB-COMMIT).

Additional resources


SourceThis report was generated using AI

Related rConfig vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-39110HIGH8.8
  • rConfigrConfig
  • cpe:2.3:a:rconfig:rconfig
NoYesAug 01, 2023
CVE-2023-39109HIGH8.8
  • rConfigrConfig
  • cpe:2.3:a:rconfig:rconfig
NoYesAug 01, 2023
CVE-2023-39108HIGH8.8
  • rConfigrConfig
  • cpe:2.3:a:rconfig:rconfig
NoYesAug 01, 2023
CVE-2022-45030HIGH8.8
  • rConfigrConfig
  • cpe:2.3:a:rconfig:rconfig
NoNoApr 15, 2023
CVE-2023-24366MEDIUM6.5
  • rConfigrConfig
  • cpe:2.3:a:rconfig:rconfig
NoNoMar 27, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management