9
CVSSv2

CVE-2019-16663

Published: 28/10/2019 Updated: 29/10/2019
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 802
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

An issue exists in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to search.crud.php because the catCommand parameter is passed to the exec function without filtering, which can lead to command execution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rconfig rconfig 3.9.2

Exploits

This Metasploit module exploits an unauthenticated command injection vulnerability in rConfig versions 392 and prior The install directory is not automatically removed after installation, allowing unauthenticated users to execute arbitrary commands via the ajaxServerSettingsChkphp file as the web server user This module has been tested success ...

Github Repositories

The official exploit for rConfig 3.9.2 Post-auth Remote Code Execution CVE-2019-16663

CVE-2019-16663 The official exploit code for Centreon v1904 Remote Code Execution CVE-2019-16662

New Found 0-days!

CVE-2019-19268 Affected Version: rConfig 392 [Description] Multiple attack vectors in rConfig v392 due to misconfiguration, which allows local users to execute root commands via sudo [Discoverers] dmw0ng - Discord: dmw0ng#4449 TheCyberGeek - Discord: TheCyberGeek#1892 Email: cybergeek19@protonmailcom The Sudo configuration in rConfig 392 gives the apache user access

Vulnerable rConfig Images Demo images for CVE-2019-16662 and CVE-2019-16663 Info This repository contains the setup to create two docker images running rConfig 392 Each image contains an /exploitpy to trigger the vulnerability For further info have a look at the corresponding blog post Run You can just pull the image from docker hub: docker run -it fab1ano/cve-2019-1666[