logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2019-19509

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2019-19509

Description:
An issue was discovered in rConfig 3.9.3. A remote authenticated user can directly execute system commands by sending a GET request to ajaxArchiveFiles.php because the path parameter is passed to the exec function without filtering, which can lead to command execution.
Last updated date:
01/31/2023

Reports

alt

ACTIVELY EXPLOITED

Type:
exploitation
Confidence:
HIGH
Date of publishing:
11/10/2020
Reference url to background

https://blogs.juniper.net/en-us/threat-research/everything-but-the-kitchen-sink-more-attacks-from-the-gitpaste-12-worm

Type:
exploit
Confidence:
HIGH
Date of publishing:
01/30/2020
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/30/2020
Reference url to background

https://github.com/v1k1ngfr

Type:
exploit
Confidence:
HIGH
Date of publishing:
01/30/2020
Type:
exploit
Confidence:
HIGH
Date of publishing:
02/24/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/31/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/31/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/31/2023
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy