rConfig.rConfig.ajaxGetFileByPath.SSRF

description-logoDescription

This indicates an attack attempt to exploit a Server-Side Request Forgery Vulnerability in rConfig.
The vulnerability is due to improper sanitation of HTTP requests in the application. The vulnerability may allow an authenticated attacker to make arbitrary requests via injection of arbitrary URLs to probe intranet web services that they normally do not have access to.

affected-products-logoAffected Products

rConfig rConfig version 3.9.4

Impact logoImpact

Privilege Escalation: Remote attackers can leverage their privileges on vulnerable systems.

recomended-action-logoRecommended Actions

Currently we are unaware of any vendor supplied patch or updates available for this issue.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2024-04-03 27.760 Default_action:pass:drop
2024-03-20 27.752