Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2019-16662

An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.945
EPSS Ranking 100.0%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 10.0
References
Products affected by CVE-2019-16662
  • Rconfig » Rconfig » Version: 3.9.2
    cpe:2.3:a:rconfig:rconfig:3.9.2


Contact Us

Shodan ® - All rights reserved