8.8
CVSSv3

CVE-2020-10221

Published: 08/03/2020 Updated: 07/10/2022
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 905
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

lib/ajaxHandlers/ajaxAddTemplate.php in rConfig up to and including 3.94 allows remote malicious users to execute arbitrary OS commands via shell metacharacters in the fileName POST parameter.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rconfig rconfig

Exploits

# Exploit Title: rConfig 393 - 'ajaxAddTemplatephp' Authenticated Remote Code Execution # Date: 2020-03-08 # Exploit Author: Engin Demirbilek # Vendor Homepage: wwwrconfigcom/ # Version: rConfig <= 394 # Tested on: centOS # CVE: CVE-2020-10221 # Advisory link: engindemirbilekgithubio/rconfig-393-rce import requests impor ...
rConfig version 393 suffers from an authenticated ajaxAddTemplatephp remote code execution vulnerability ...

Github Repositories

ZeroDay exploits that i have shared. #CentreonExploit #rConfigExploit #PandoraFMSExploit

Public Exploits ZeroDay exploits that i have shared CVE-2020-13252 Centreon <= 191015 Authenticated RCE Exploit-DB link: wwwexploit-dbcom/exploits/48256 Advisory link: engindemirbilekgithubio/centreon-1910-rce CVE-2020-10221 rConfig 393 Authenticated RCE Exploit-DB link: wwwexploit-dbcom/exploits/48207 Advisory link: engindemi