what you don't know can hurt you
Showing 1 - 12 of 12 RSS Feed

Files

rConfig 3.9.2 Remote Code Execution
Posted Oct 29, 2019
Authored by Askar

rConfig version 3.9.2 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2019-16662
MD5 | 2dc764b912bb271d4a13e36dc91a18ba

Related Files

Apache Solr 8.3.0 Velocity Template Remote Code Execution
Posted Apr 3, 2020
Authored by Imran Dawoodjee, JAS502N, s00py, AleWong | Site metasploit.com

This Metasploit module exploits a vulnerability in Apache Solr versions 8.3.0 and below which allows remote code execution via a custom Velocity template. Currently, this module only supports Solr basic authentication. From the Tenable advisory: An attacker could target a vulnerable Apache Solr instance by first identifying a list of Solr core names. Once the core names have been identified, an attacker can send a specially crafted HTTP POST request to the Config API to toggle the params resource loader value for the Velocity Response Writer in the solrconfig.xml file to true. Enabling this parameter would allow an attacker to use the Velocity template parameter in a specially crafted Solr request, leading to remote code execution.

tags | exploit, remote, web, code execution
advisories | CVE-2019-17558
MD5 | b5dc475b45fed04ef8882d4f1ad70e5d
rConfig 3.9.4 searchField Remote Code Execution
Posted Mar 28, 2020
Authored by vikingfr

rConfig version 3.9.4 searchField unauthenticated remote root code execution exploit.

tags | exploit, remote, root, code execution
advisories | CVE-2019-19509, CVE-2019-19585, CVE-2020-10220
MD5 | 8c716113452b1998821e833fac8675aa
rConfig 3.9.4 Remote Command Injection
Posted Mar 23, 2020
Authored by Matthew Aberegg, Michael Burkey

rConfig version 3.9.4 suffers from a search.crud.php remote command injection vulnerability.

tags | exploit, remote, php
MD5 | 825dfc3c3e408b5672224d857d18de7b
Rconfig 3.x Chained Remote Code Execution
Posted Mar 16, 2020
Authored by Orange Cyberdefense, Jean-Pascal Thomas | Site metasploit.com

This Metasploit module takes advantage of a command injection vulnerability in the path parameter of the ajax archive file functionality within the rConfig web interface in order to execute the payload. Valid credentials for a user with administrative privileges are required . However, this module can bypass authentication via SQL injection.

tags | exploit, web, sql injection
advisories | CVE-2019-19509, CVE-2020-10220
MD5 | 1b7eba13c1f9f44916dfebaf6c5be5e6
rConfig 3.9 SQL Injection
Posted Mar 11, 2020
Authored by vikingfr

rConfig version 3.9 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2020-10220
MD5 | 7d8552d51fc5bfa30e23f1584c30582e
rConfig 3.93 Authenticated Remote Code Execution
Posted Mar 11, 2020
Authored by Engin Demirbilek

rConfig version 3.93 suffers from an authenticated ajaxAddTemplate.php remote code execution vulnerability.

tags | exploit, remote, php, code execution
advisories | CVE-2020-10221
MD5 | 85d122ff0df2067290a863cffe078fa7
rConfig 3.9.3 Remote Code Execution
Posted Jan 30, 2020
Authored by vikingfr

rConfig version 3.9.3 suffers from an authenticated remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2019-19509
MD5 | 26b376c625041af03fef93e48412214a
rConfig 3.9.2 Command Injection
Posted Nov 7, 2019
Authored by Brendan Coles, mhaskar | Site metasploit.com

This Metasploit module exploits an unauthenticated command injection vulnerability in rConfig versions 3.9.2 and prior. The install directory is not automatically removed after installation, allowing unauthenticated users to execute arbitrary commands via the ajaxServerSettingsChk.php file as the web server user. This module has been tested successfully on rConfig version 3.9.2 on CentOS 7.7.1908 (x64).

tags | exploit, web, arbitrary, php
systems | linux, centos
advisories | CVE-2019-16662
MD5 | 5a8c7959c835ac3cbcc733bb6b9b60ac
rConfig 3.1.1 Local File Inclusion
Posted Jun 2, 2016
Authored by Gregory Pickett | Site hellfiresecurity.com

rConfig versions 3.1.1 and below suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 762009f992d1d06c83f107f5378da06e
DBO Local Denial Of Service
Posted Sep 15, 2011
Authored by AlpHaNiX

DBO local denial of service exploit that leverages LauncherConfig.xml.

tags | exploit, denial of service, local
MD5 | 945111471b42c47f3dd5cba5147ebb6a
Mandriva Linux Security Advisory 2009-253
Posted Oct 2, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-253 - CgiUserConfigEdit in BackupPC 3.1.0, when SSH keys and Rsync are in use in a multi-user environment, does not restrict users from the ClientNameAlias function, which allows remote authenticated users to read and write sensitive files by modifying ClientNameAlias to match another system, then initiating a backup or restore. This update provides a fix for this vulnerability.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2009-3369
MD5 | 9e48a1e291f8a1e91fc5cb322410d40b
SSRT4891.txt
Posted Mar 15, 2005
Site hp.com

HP Security Bulletin - There is a potential security vulnerability on HP Tru64 UNIX systems message queue where a local unpriviledged user may cause a local Denial of Service (DoS). The vulnerability may impact processes such as nfsstat, pfstat, arp, ogated, rarpd, route, sendmail, srconfig, strsetup, trpt, netstat, and xntpd.

tags | advisory, denial of service, local
systems | unix
MD5 | 6e024e74ee6cf6785a3b4f048c574f56
Page 1 of 1
Back1Next

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    15 Files
  • 4
    Apr 4th
    5 Files
  • 5
    Apr 5th
    5 Files
  • 6
    Apr 6th
    27 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close