An issue was discovered in rConfig 3.9.3. The install script updates the /etc/sudoers file for rconfig specific tasks. After an "rConfig specific Apache configuration" update, apache has high privileges for some binaries. This can be exploited by an attacker to bypass local security restrictions.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/156950/rConfig-3.9.4-searchField-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://github.com/v1k1ngfr/exploits-rconfig/blob/master/rconfig_lpe.sh | Exploit Third Party Advisory |
https://raw.githubusercontent.com/v1k1ngfr/exploits/master/rconfig_lpe.sh?token= | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-01-06 20:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-19585
Mitre link : CVE-2019-19585
CVE.ORG link : CVE-2019-19585
JSON object : View
Products Affected
rconfig
- rconfig
CWE
CWE-269
Improper Privilege Management