rConfig 3.9.6 is affected by SQL Injection. A user must be authenticated to exploit the vulnerability. If --secure-file-priv in MySQL server is not set and the Mysql server is the same as rConfig, an attacker may successfully upload a webshell to the server and access it remotely.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
http://rconfig.com | vendor advisory |
https://rconfig.com | vendor advisory |
https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2021-29004-POC-req.txt | third party advisory |
https://github.com/mrojz/rconfig-exploit/blob/main/README.md | third party advisory |