An issue was discovered in rConfig 3.9.3. The install script updates the /etc/sudoers file for rconfig specific tasks. After an "rConfig specific Apache configuration" update, apache has high privileges for some binaries. This can be exploited by an attacker to bypass local security restrictions.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
https://raw.githubusercontent.com/v1k1ngfr/exploits/master/rconfig_lpe.sh?token= | third party advisory exploit |
https://github.com/v1k1ngfr/exploits-rconfig/blob/master/rconfig_lpe.sh | third party advisory exploit |
http://packetstormsecurity.com/files/156950/rConfig-3.9.4-searchField-Remote-Code-Execution.html | exploit vdb entry third party advisory |