关联漏洞
标题:
Webmin 命令操作系统命令注入漏洞
(CVE-2019-15107)
描述:Webmin是一套基于Web的用于类Unix操作系统中的系统管理工具。 Webmin 1.920及之前版本中的password_change.cgi存在命令操作系统命令注入漏洞。该漏洞源于外部输入数据构造可执行命令过程中,网络系统或产品未正确过滤其中的特殊元素。攻击者可利用该漏洞执行非法命令。
描述
A Python proof-of-concept exploit for CVE-2019-15107 - an unauthenticated remote code execution vulnerability in Webmin versions 1.890 through 1.920.
介绍
# CVE-2019-15107 Webmin RCE PoC
A Python proof-of-concept exploit for CVE-2019-15107 - an unauthenticated remote code execution vulnerability in Webmin versions 1.890 through 1.920.
## Description
This vulnerability exists in the `/password_change.cgi` endpoint of Webmin and allows unauthenticated attackers to execute arbitrary commands with root privileges due to a backdoor in the source code.
## Affected Versions
- Webmin 1.890 through 1.920
## Related Tools
For scanning multiple hosts to detect vulnerable systems, check out:
🔍 [CVE-2019-15107-Scanner](https://github.com/Mattb709/CVE-2019-15107-Scanner) - A companion tool to scan lists of hosts for this vulnerability
## Features
- Vulnerability checking
- Interactive exploitation menu
- Direct command execution
- Color-coded output for better readability
- Multiple built-in command options
### Usage
The exploit is designed to be run with a single target specification, after which it enters an interactive menu for exploitation options.
Basic command:
```bash
python CVE-2019-15107-PoC.py --exploit IP:PORT
```
Example:
```bash
python CVE-2019-15107-PoC.py --exploit 94.26.14.68:1111
```
After running this command, the script will:
1. Verify if the target is vulnerable
2. Present an interactive menu if the target is vulnerable
### Interactive Menu Options
The menu provides several exploitation options:
```
1. Execute custom command
2. List system users (/etc/passwd)
3. Get system information (uname -a)
4. List running processes (ps aux)
5. Check current user privileges (whoami)
6. Network information (ifconfig)
7. Exit
```
## Recommended Workflow
1. Use [CVE-2019-15107-Scanner](https://github.com/Mattb709/CVE-2019-15107-Scanner) to identify vulnerable hosts
2. Use CVE-2019-15107-PoC.py to verify and exploit specific targets
## Requirements
- Python 3.x
- `requests` library
- `colorama` library (for colored output)
Install dependencies with:
```
pip install requests colorama
```
## Warning
This tool is for educational and authorized testing purposes only. Unauthorized use against systems you don't own or have permission to test is illegal.
## References
- [CVE-2019-15107](https://nvd.nist.gov/vuln/detail/CVE-2019-15107)
- [Webmin Security Advisory](https://www.webmin.com/security.html)
## Disclaimer
The author is not responsible for any misuse of this tool. Use at your own risk and only on systems you have permission to test.
## Sample Output

文件快照
[4.0K] /data/pocs/fabb0a660f59036d91464a7845bba6b11562e933
├── [5.5K] CVE-2019-15107-PoC.py
├── [1.0K] LICENSE
├── [2.5K] README.md
└── [ 33] requirements.txt
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。