rConfig.rConfig.ajaxGetFileByPath.SSRF
Description
This indicates an attack attempt to exploit a Server-Side Request Forgery Vulnerability in rConfig.
The vulnerability is due to improper sanitation of HTTP requests in the application. The vulnerability may allow an authenticated attacker to make arbitrary requests via injection of arbitrary URLs to probe intranet web services that they normally do not have access to.
Affected Products
rConfig rConfig version 3.9.4
Impact
Privilege Escalation: Remote attackers can leverage their privileges on vulnerable systems.
Recommended Actions
Currently we are unaware of any vendor supplied patch or updates available for this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |