
Cloud Vulnerability DB
A community-led vulnerabilities database
rConfig before version 3.9.5 contains a command injection vulnerability identified as CVE-2020-10879. The vulnerability was discovered and disclosed on March 23, 2020, affecting the network configuration management software. The security flaw exists in the lib/crud/search.crud.php file, where the nodeId parameter is passed directly to the exec function without proper input validation or escaping (CVE-MITRE).
The vulnerability stems from improper input validation in the search.crud.php file. Specifically, the nodeId parameter is passed directly to the exec function without any sanitization or escaping mechanisms, allowing attackers to inject and execute arbitrary system commands (EXPLOIT-DB).
When successfully exploited, this vulnerability allows attackers to execute arbitrary commands on the affected system through a crafted GET request. This can lead to complete system compromise, allowing attackers to gain unauthorized access and control over the affected rConfig installation (EXPLOIT-DB).
The vulnerability has been patched in rConfig version 3.9.5. Users are strongly advised to upgrade to this version or later to protect against this security flaw. The fix can be found in the official repository commit that addresses the command injection vulnerability (GITHUB-COMMIT).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."