Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-10548 PoC — rConfig SQL注入漏洞

Source
Associated Vulnerability
Title:rConfig SQL注入漏洞 (CVE-2020-10548)
Description:rConfig是一款开源的网络配置管理实用程序。 rConfig 3.9.4及之前版本中存在SQL注入漏洞,该漏洞源于程序以明文形式存储节点密码。攻击者可利用该漏洞访问被监听的网络设备。
Description
rConfig 3.9.4 and previous versions have unauthenticated devices.inc.php SQL injection. Because nodes' passwords are stored in cleartext by default, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
File Snapshot

id: CVE-2020-10548 info: name: rConfig 3.9.4 - SQL Injection author: madrobot severity: criti ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.