Vulnerability Details CVE-2020-10221
lib/ajaxHandlers/ajaxAddTemplate.php in rConfig through 3.94 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the fileName POST parameter.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.911
EPSS Ranking 99.6%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 9.0
Proposed Action
rConfig lib/ajaxHandlers/ajaxAddTemplate.php contains an OS command injection vulnerability that allows remote attackers to execute OS commands via shell metacharacters in the fileName POST parameter.
Ransomware Campaign
Unknown
Products affected by CVE-2020-10221
-
cpe:2.3:a:rconfig:rconfig:1.0.0
-
cpe:2.3:a:rconfig:rconfig:1.0.11
-
cpe:2.3:a:rconfig:rconfig:1.1.2
-
cpe:2.3:a:rconfig:rconfig:1.2.0
-
cpe:2.3:a:rconfig:rconfig:1.2.4
-
cpe:2.3:a:rconfig:rconfig:1.2.5
-
cpe:2.3:a:rconfig:rconfig:1.2.6
-
cpe:2.3:a:rconfig:rconfig:1.2.7
-
cpe:2.3:a:rconfig:rconfig:1.2.8
-
cpe:2.3:a:rconfig:rconfig:1.2.9
-
cpe:2.3:a:rconfig:rconfig:2.0.0
-
cpe:2.3:a:rconfig:rconfig:2.0.1
-
cpe:2.3:a:rconfig:rconfig:2.0.3
-
cpe:2.3:a:rconfig:rconfig:3.0.0
-
cpe:2.3:a:rconfig:rconfig:3.0.1
-
cpe:2.3:a:rconfig:rconfig:3.0.2
-
cpe:2.3:a:rconfig:rconfig:3.0.3
-
cpe:2.3:a:rconfig:rconfig:3.1.0
-
cpe:2.3:a:rconfig:rconfig:3.1.1
-
cpe:2.3:a:rconfig:rconfig:3.5.0
-
cpe:2.3:a:rconfig:rconfig:3.5.1
-
cpe:2.3:a:rconfig:rconfig:3.5.2
-
cpe:2.3:a:rconfig:rconfig:3.5.4
-
cpe:2.3:a:rconfig:rconfig:3.6.0
-
cpe:2.3:a:rconfig:rconfig:3.6.7
-
cpe:2.3:a:rconfig:rconfig:3.6.8
-
cpe:2.3:a:rconfig:rconfig:3.6.9
-
cpe:2.3:a:rconfig:rconfig:3.7.5
-
cpe:2.3:a:rconfig:rconfig:3.8.0
-
cpe:2.3:a:rconfig:rconfig:3.8.6
-
cpe:2.3:a:rconfig:rconfig:3.8.7
-
cpe:2.3:a:rconfig:rconfig:3.9.0
-
cpe:2.3:a:rconfig:rconfig:3.9.1
-
cpe:2.3:a:rconfig:rconfig:3.9.2
-
cpe:2.3:a:rconfig:rconfig:3.9.3
-
cpe:2.3:a:rconfig:rconfig:3.9.4