Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
rConfig 3.9.4 and earlier allows authenticated code execution (of system commands) by sending a forged GET request to lib/ajaxHandlers/ajaxAddTemplate.php or lib/ajaxHandlers/ajaxEditTemplate.php.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
rConfig 操作系统命令注入漏洞
Vulnerability Description
rConfig是一款开源的网络配置管理实用程序。 rConfig 3.9.4版本及之前版本存在安全漏洞,该漏洞源于允许通过将伪造的GET请求发送到lib/ajaxHandlers/ajaxAddTemplate.php或lib/ajaxHandlers/ajaxEditTemplate.php来执行(系统命令的)身份验证代码执行。
CVSS Information
N/A
Vulnerability Type
N/A