SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  rConfig ajaxServerSettingsChk.php Remote Command Execution

Category: WEB-ATTACKS      

An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution.

References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16662


Relevant Information