
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-23151 affects rConfig version 3.9.5, a network device configuration management tool. The vulnerability allows command injection through the path parameter in lib/ajaxHandlers/ajaxArchiveFiles.php file, which is passed directly to the exec function without proper sanitization (NVD).
The vulnerability is classified as an OS Command Injection (CWE-78) with a CVSS v3.1 Base Score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The issue occurs when the path parameter is passed to the exec function without proper escaping or validation of special characters, allowing command injection through crafted GET requests (NVD, CWE).
Due to the critical severity rating and the nature of command injection vulnerabilities, successful exploitation could allow attackers to execute arbitrary operating system commands with the privileges of the web application. This could lead to complete system compromise, including the ability to read and modify files, access sensitive data, and potentially take full control of the affected system (CWE).
The recommended mitigation is to update to a patched version of rConfig. For systems that cannot be immediately updated, implementing strict input validation and command sanitization for the path parameter, along with running the application with minimal required privileges can help reduce the risk (CWE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."