CVE-2023-24366
📋 TL;DR
CVE-2023-24366 is an arbitrary file download vulnerability in rConfig v6.8.0 that allows attackers to download sensitive files from the server via crafted HTTP requests. This affects all organizations running vulnerable versions of rConfig network management software. Attackers can potentially access configuration files, credentials, and other sensitive data.
💻 Affected Systems
- rConfig
📦 What is this software?
Rconfig by Rconfig
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through credential theft from configuration files, database access, and lateral movement within the network.
Likely Case
Sensitive data exposure including database credentials, SSH keys, configuration files, and potentially user credentials leading to further attacks.
If Mitigated
Limited impact with proper network segmentation, file permissions, and monitoring detecting unauthorized file access attempts.
🎯 Exploit Status
Multiple public exploit scripts available on GitHub. Exploitation requires only HTTP access and knowledge of file paths.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v6.9.0 or later
Vendor Advisory: https://github.com/rconfig/rconfig/releases
Restart Required: Yes
Instructions:
1. Backup current rConfig installation and database. 2. Download latest version from official repository. 3. Replace vulnerable files with patched version. 4. Restart web server service. 5. Verify functionality.
🔧 Temporary Workarounds
Web Server Access Restriction
allRestrict access to rConfig web interface using firewall rules or web server configuration
# Apache: Use .htaccess or virtual host config
# Nginx: Use location blocks with allow/deny
# Firewall: iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
File Permission Hardening
linuxRestrict file permissions on sensitive directories and configuration files
chmod 600 /path/to/rconfig/config.php
chmod 700 /path/to/rconfig/
chown root:www-data /path/to/rconfig/
🧯 If You Can't Patch
- Implement strict network access controls to limit rConfig access to trusted IPs only
- Deploy web application firewall (WAF) with rules to block directory traversal and file download patterns
🔍 How to Verify
Check if Vulnerable:
Check if running rConfig v6.8.0 by examining version files or web interface. Test with known exploit scripts from GitHub repositories.
Check Version:
grep -r 'version' /path/to/rconfig/install/ or check web interface footer
Verify Fix Applied:
Verify version is updated to v6.9.0 or later. Test file download functionality with traversal attempts to confirm patched.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests with ../ patterns in URL parameters
- Unusual file download patterns from rConfig directories
- Access to sensitive file paths via web logs
Network Indicators:
- HTTP requests containing directory traversal sequences (../)
- Multiple file download attempts from single IP
SIEM Query:
source="web_logs" AND url="*../*" AND (uri_path="/rconfig/*" OR host="rconfig*")
🔗 References
- https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2023-24366.md
- https://github.com/mrojz/rconfig-exploit/blob/main/rconfigV6_Local_File_Disclosure.md
- https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2023-24366.md
- https://github.com/mrojz/rconfig-exploit/blob/main/rconfigV6_Local_File_Disclosure.md