Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-0824 PoC — Webmin 访问控制错误漏洞

Source
Associated Vulnerability
Title:Webmin 访问控制错误漏洞 (CVE-2022-0824)
Description:Webmin是Webmin社区的一套基于Web的用于类Unix操作系统中的系统管理工具。 Webmin 1.990之前版本存在安全漏洞,该漏洞源于软件中存在不正确的访问控制,攻击者可以利用该漏洞实现远程代码执行。
Description
Deployement of Webmin version 1.984 which is vulnerable to authenticated remote code execution exploit.
Readme
# CVE-2022-0824

[![Docker](https://github.com/cryst4lliz3/CVE-2022-0824/actions/workflows/docker.yml/badge.svg)](https://github.com/cryst4lliz3/CVE-2022-0824/actions/workflows/docker.yml)

> Deployement of Webmin version 1.984 which is vulnerable to authenticated remote code execution exploit.

## Description

In Webmin version 1.984, affecting File Manager module, any authenticated low privilege user without access rights to the File Manager module could interact with file manager functionalities such as download file from remote URL and change file permission, `chmod`. It is possible to achieve Remote Code Execution via a crafted .cgi file by chaining those functionalities in the file manager.

## Deployement

```bash
docker-compose up -d
```

## Login Credentials

```creds
root:password
```

## Volumes

```volumes
$PWD/CVE-2022-0824/data → /var/webmin

```

## Proof of Concept

## Impact

This vulnerability is capable of modifying the OS file system and executing OS Command with running application privilege.

## References

- https://huntr.dev/bounties/d0049a96-de90-4b1a-9111-94de1044f295/
- https://nvd.nist.gov/vuln/detail/CVE-2022-0824
- https://www.webmin.com/security.html
File Snapshot

[4.0K] /data/pocs/7705de84459cb2eb40f8edec72c12d88ed7e297f ├── [ 221] docker-compose.yaml ├── [1.0K] LICENSE ├── [1.2K] README.md └── [4.0K] webmin └── [1.4K] Dockerfile 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.