CVE-2020-27464

7.8 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary code on rConfig servers by uploading a malicious ZIP file to the insecure /updater.php component. It affects all rConfig installations version 3.9.6 and below. Attackers can gain full control of affected systems without requiring authentication.

💻 Affected Systems

Products:
  • rConfig
Versions: 3.9.6 and all earlier versions
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The /updater.php component is typically accessible by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install backdoors, steal sensitive network configuration data, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Attackers gain shell access to the rConfig server, allowing them to modify network device configurations, steal credentials, and use the server as a foothold for further attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the rConfig server itself, though sensitive configuration data could still be compromised.

🌐 Internet-Facing: HIGH - The vulnerability requires no authentication and can be exploited remotely via HTTP requests.
🏢 Internal Only: HIGH - Even internally, any user with network access to the rConfig server can exploit this vulnerability without credentials.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward with publicly available proof-of-concept code. Attackers only need to craft a malicious ZIP file and send it to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.9.7 and above

Vendor Advisory: https://rconfig.com/download

Restart Required: No

Instructions:

1. Download rConfig version 3.9.7 or later from the official website. 2. Backup your current installation and database. 3. Follow the upgrade instructions in the rConfig documentation. 4. Verify the /updater.php component has been secured or removed.

🔧 Temporary Workarounds

Block access to updater.php

all

Temporarily block HTTP access to the vulnerable /updater.php component using web server configuration or firewall rules.

# For Apache: add to .htaccess or virtual host config
<Files "updater.php">
    Order allow,deny
    Deny from all
</Files>
# For Nginx: add to server block
location ~ /updater\.php$ {
    deny all;
    return 403;
}

Remove updater.php file

linux

Delete or rename the vulnerable updater.php file to prevent exploitation.

# Backup then remove the file
cp /path/to/rconfig/updater.php /path/to/rconfig/updater.php.backup
rm /path/to/rconfig/updater.php

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to rConfig servers to authorized administrators only.
  • Deploy a web application firewall (WAF) with rules to block malicious ZIP file uploads and RCE attempts.

🔍 How to Verify

Check if Vulnerable:

Check if /updater.php is accessible via HTTP GET request and if rConfig version is 3.9.6 or below. Also check for presence of vulnerable file: ls -la /path/to/rconfig/updater.php

Check Version:

grep -r "version" /path/to/rconfig/install/directory/*.php | grep -i "3.9"

Verify Fix Applied:

Verify rConfig version is 3.9.7 or higher and that /updater.php either returns 403/404 or has been removed. Test with a benign request to confirm access is blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /updater.php with ZIP file uploads
  • Unusual file creation in web directories (especially PHP files)
  • Commands executed via web server user (www-data, apache, nginx)

Network Indicators:

  • HTTP traffic to /updater.php endpoint
  • ZIP file uploads to the rConfig server
  • Outbound connections from rConfig server to suspicious IPs

SIEM Query:

source="web_server_logs" AND (uri_path="/updater.php" OR file_extension=".zip") AND status_code=200

🔗 References

📤 Share & Export