Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-10549

EPSS 92.99% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-10549

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
rConfig 3.9.4 and previous versions has unauthenticated snippets.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
rConfig SQL注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
rConfig是一款开源的网络配置管理实用程序。 rConfig 3.9.4及之前版本中存在SQL注入漏洞,该漏洞源于程序以明文形式存储节点密码。攻击者可利用该漏洞访问被监听的网络设备。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-10549

#POC DescriptionSource LinkShenlong Link
1rConfig 3.9.4 and prior has unauthenticated snippets.inc.php SQL injection. Because nodes' passwords are stored in cleartext by default, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-10549.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-10549

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-06-04 · 94 CVEs total

CVE-2019-20815Foxit PhantomPDF 资源管理错误漏洞
CVE-2019-20818Foxit Reader和PhantomPDF 资源管理错误漏洞
CVE-2019-20820Foxit Reader 和 Foxit PhantomPDF 代码问题漏洞
CVE-2018-21244Foxit PhantomPDF 代码问题漏洞
CVE-2018-21243Foxit PhantomPDF 代码问题漏洞
CVE-2018-21242Foxit PhantomPDF 信息泄露漏洞
CVE-2018-21241Foxit PhantomPDF 代码问题漏洞
CVE-2018-21240Foxit Reader和PhantomPDF 资源管理错误漏洞
CVE-2020-9462Athom Homey 安全漏洞
CVE-2019-20816Foxit PhantomPDF 代码问题漏洞
CVE-2019-20817Foxit Reader和PhantomPDF 代码问题漏洞
CVE-2019-20814Foxit PhantomPDF 资源管理错误漏洞
CVE-2019-20813Foxit PhantomPDF 代码问题漏洞
CVE-2020-13815Foxit Reader和Foxit PhantomPDF 资源管理错误漏洞
CVE-2020-13814Foxit Reader和PhantomPDF 资源管理错误漏洞
CVE-2020-13813Foxit Studio Photo 代码问题漏洞
CVE-2019-16384Cybele Software Thinfinity VirtualUI 路径遍历漏洞
CVE-2019-16385Cybele Software Thinfinity VirtualUI 跨站脚本漏洞
CVE-2020-13812Foxit Studio Photo 代码问题漏洞
CVE-2020-13765QEMU 缓冲区错误漏洞

Showing top 20 of 94 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-10549

No comments yet


Leave a comment