关联漏洞
描述
A Python replicated exploit for Webmin 1.580 /file/show.cgi Remote Code Execution
介绍
# CVE-2012-2982
> John Hammond | September 4th, 2021
------------------------
Checking `searchsploit` for Webmin 1.580 I only saw a Metasploit module for
the `/file/show.cgi` Remote Code Execution attack on that legacy Webmin version.
This code is an attempt to recreate that in Python without using Metasploit.
# Files
* `CVE-2021-2982.py` - this offers a one-shot capability to run a single command
文件快照
[4.0K] /data/pocs/c9b2a0a37663b9a919383922bede0aa763a908ce
├── [3.8K] CVE-2012-2982.py
└── [ 409] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。