CVE-2019-19509
The target rConfig instance is vulnerable to CVE-2019-19509
due to its outdated version
A vulnerability has been found in rConfig and classified as critical. Affected by this vulnerability is the function
exec
of the file ajaxArchiveFiles.php of the component System. The manipulation of the argument path as part of System Command leads to os command injection. This vulnerability is known as CVE-2019-19509. The attack can be launched remotely. Furthermore, there is an exploit available.
Exploit
Original exploit repository located
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/quackerJack]
└─$ git clone https://github.com/v1k1ngfr/exploits-rconfig ; cd exploits-rconfig
Cloning into 'exploits-rconfig'...
remote: Enumerating objects: 100, done.
remote: Counting objects: 100% (100/100), done.
remote: Compressing objects: 100% (96/96), done.
remote: Total 100 (delta 44), reused 0 (delta 0), pack-reused 0 (from 0)
Receiving objects: 100% (100/100), 33.75 KiB | 2.11 MiB/s, done.
Resolving deltas: 100% (44/44), done.
Cloning the exploit repo to Kali
Modification
Fixing the line 65 and 72 of the rconfig_CVE-2019-19509.py file, to not check self-signed certificate