An issue was discovered in rConfig 3.9.3. The install script updates the /etc/sudoers file for rconfig specific tasks. After an "rConfig specific Apache configuration" update, apache has high privileges for some binaries. This can be exploited by an attacker to bypass local security restrictions.
References
Link | Resource |
---|---|
https://raw.githubusercontent.com/v1k1ngfr/exploits/master/rconfig_lpe.sh?token= | Exploit Third Party Advisory |
https://github.com/v1k1ngfr/exploits-rconfig/blob/master/rconfig_lpe.sh | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/156950/rConfig-3.9.4-searchField-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2020-01-06 12:15
Updated : 2023-01-31 12:46
NVD link : CVE-2019-19585
Mitre link : CVE-2019-19585
JSON object : View
CWE
CWE-269
Improper Privilege Management
Products Affected
rconfig
- rconfig