Loading
rConfig 3.9.5 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a crafted request to the ajaxGetFileByPath.php script containing hexadecimal encoded "dot dot" sequences (%2f..%2f) in the path parameter to view arbitrary files on the system.
Use CWE-22, Rconfig vendor hub and Rconfig product page to widen CVE-2020-15712 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2020-25359, CVE-2023-39110 and CVE-2023-39109 for nearby disclosures in the same product family.