
Cloud Vulnerability DB
A community-led vulnerabilities database
A server-side request forgery (SSRF) vulnerability was discovered in rConfig 3.9.5 in the /lib/ajaxHandlers/ajaxDeviceStatus.php file. The vulnerability allows an attacker to establish connections to internal systems by manipulating the deviceIpAddr and connPort parameters (Stark0de).
The SSRF vulnerability exists in the ajaxDeviceStatus.php handler and can be exploited by sending crafted requests with modified deviceIpAddr and connPort parameters. This allows an attacker to initiate connections to internal network resources that should not be accessible externally (Stark0de).
A successful exploitation of this vulnerability could allow attackers to scan and connect to internal network services and resources that are normally inaccessible from external networks, potentially leading to further network compromise (CISA).
Users should upgrade to a version newer than 3.9.5 which contains fixes for this vulnerability. If immediate upgrade is not possible, network access to the rConfig application should be strictly limited (CISA).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."