rConfig 3.9.5 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a crafted request to the ajaxGetFileByPath.php script containing hexadecimal encoded “dot dot” sequences (%2f..%2f) in the path parameter to view arbitrary files on the system.
Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15712
Reference (s):
- https://exchange.xforce.ibmcloud.com/vulnerabilities/184938
- https://www.rconfig.com/downloads/v3-release-notes

