If you are using rConfig application, it is better to check your system if any vulnerability exists.
An issue was discovered in includes/head.inc.php in rConfig before 3.9.4. An unauthenticated attacker can retrieve saved cleartext credentials via a GET request to settings.php. Because the application was not exiting after a redirect is applied, the rest of the page still executed, resulting in the disclosure of cleartext credentials in the response.
Update your rConfig application, to the latest version to eliminate this vulnerability.