# N/A
# 漏洞描述
## 概述
在Webmin 1.590及更早版本中,`file/show.cgi`存在漏洞,允许远程认证用户通过在路径名中包含非法字符(如管道符“|”)执行任意命令。
## 影响版本
- Webmin 1.590及更早版本
## 细节
攻击者可以利用路径名中的非法字符(例如管道符“|”)触发命令执行。这种非法字符的利用可以导致在服务器上执行任意命令。
## 影响
此漏洞可能导致远程认证用户在目标系统上执行任意命令,从而可能引发进一步的安全问题,例如数据泄露或系统接管。
是否为 Web 类漏洞: 是
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | This was converted from a metasploit module as an exercise for OSCP studying | https://github.com/cd6629/CVE-2012-2982-Python-PoC | POC详情 |
| 2 | Python exploit for CVE-2012-2982 | https://github.com/OstojaOfficial/CVE-2012-2982 | POC详情 |
| 3 | PoC Python script as an exercice from tryhackme. | https://github.com/AlexJS6/CVE-2012-2982_Python | POC详情 |
| 4 | Exploit for CVE-2012-2982 | https://github.com/Ari-Weinberg/CVE-2012-2982 | POC详情 |
| 5 | A Python replicated exploit for Webmin 1.580 /file/show.cgi Remote Code Execution | https://github.com/JohnHammond/CVE-2012-2982 | POC详情 |
| 6 | None | https://github.com/R00tendo/CVE-2012-2982 | POC详情 |
| 7 | POC en Python para el CVE-2012-2982 mejorado del original por el usuario @OstojaOfficial | https://github.com/blu3ming/CVE-2012-2982 | POC详情 |
| 8 | None | https://github.com/0xF331-D3AD/CVE-2012-2982 | POC详情 |
| 9 | An exploit for CVE-2012-2982 implemented in Rust | https://github.com/0xTas/CVE-2012-2982 | POC详情 |
| 10 | Python Code For CVE-2012-2982 | https://github.com/Dawnn3619/CVE-2012-2982 | POC详情 |
| 11 | my own script in python to exploit vulnerable (It based on TryHackMe Intro PoC Scripting room) | https://github.com/LeDucKhiem/CVE-2012-2982 | POC详情 |
| 12 | Practice POC scripting in Tryhackme’s intro poc scripting room (For Linux) | https://github.com/CpyRe/CVE-2012-2982 | POC详情 |
| 13 | None | https://github.com/Shadow-Spinner/CVE-2012-2982_python | POC详情 |
| 14 | None | https://github.com/elliotosama/CVE-2012-2982 | POC详情 |
| 15 | PoC exploit for CVE-2012-2982 (Webmin RCE), for educational purposes. | https://github.com/SieGer05/CVE-2012-2982-Webmin-Exploit | POC详情 |
| 16 | None | https://github.com/SpoofIMEI/CVE-2012-2982 | POC详情 |
| 17 | Webmin 1.580 /file/show.cgi Remote Code Execution | https://github.com/lpuv/CVE-2012-2982 | POC详情 |
| 18 | PoC Python script as an exercice from tryhackme. | https://github.com/Gvmyz/CVE-2012-2982_Python | POC详情 |
| 19 | A short and sweet simple exploit script for the CVE-2012-2982 Authenticated RCE vulnerability in the /file/show.cgi/bin endpoint. | https://github.com/SincIDK/CVE-2012-2982-Exploit-Script | POC详情 |
| 20 | None | https://github.com/varppi/CVE-2012-2982 | POC详情 |
| 21 | None | https://github.com/boritopalito/CVE-2012-2982 | POC详情 |
| 22 | None | https://github.com/boriitoo/CVE-2012-2982 | POC详情 |
| 23 | Python PoC for Webmin 1.580 Remote Command Execution (CVE-2012-2982) | https://github.com/JRrooot/CVE-2012-2982-Webmin-RCE | POC详情 |
标题: Redirecting... -- 🔗来源链接
标签:x_refsource_MISC
暂无评论