Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-15642

EPSS 92.93% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-15642

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify any file on a server, which is why access to it must not be granted to un-trusted Webmin users."
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Webmin 代码注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Webmin是一套基于Web的用于类Unix操作系统中的系统管理工具。 Webmin 1.920及之前版本中的rpc.cgi文件存在安全漏洞。攻击者可借助特制的对象名称利用该漏洞执行代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2019-15642

#POC DescriptionSource LinkShenlong Link
1Webmin Remote Code Execution (authenticated) https://github.com/jas502n/CVE-2019-15642POC Details
2rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify any file on a server, which is why access to it must not be granted to un-trusted Webmin users." https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-15642.yamlPOC Details
3Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Webmin%20rpc.cgi%20%E5%90%8E%E5%8F%B0%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2019-15642.mdPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-15642

登录查看更多情报信息。

Same Patch Batch · n/a · 2019-08-26 · 83 CVEs total

CVE-2019-15572Gesior-AAC SQL注入漏洞
CVE-2019-15524CSZ CMS 代码问题漏洞
CVE-2019-15570BEdita SQL注入漏洞
CVE-2019-15571ClonOS WEB control panel SQL注入漏洞
CVE-2018-21000safe-transmute crate for Rust 缓冲区错误漏洞
CVE-2019-15568Infectious Disease Sequencing Platform Idseq SQL注入漏洞
CVE-2019-15553memoffset crate for Rust 信息泄露漏洞
CVE-2019-15567OpenForis Arena SQL注入漏洞
CVE-2019-15554smallvec crate for Rust 缓冲区错误漏洞
CVE-2019-15550simd-json crate for Rust 缓冲区错误漏洞
CVE-2018-20999orion crate for Rust 权限许可和访问控制问题漏洞
CVE-2019-15573Gesior-AAC SQL注入漏洞
CVE-2018-20991smallvec crate for Rust 资源管理错误漏洞
CVE-2019-15574Gesior-AAC SQL注入漏洞
CVE-2019-14300多款RICOH产品缓冲区错误漏洞
CVE-2019-14305多款RICOH产品缓冲区错误漏洞
CVE-2019-14307多款RICOH产品缓冲区错误漏洞
CVE-2019-15479Status Board 跨站脚本漏洞
CVE-2019-15501L-Soft LISTSERV 跨站脚本漏洞
CVE-2019-14308多款RICOH产品缓冲区错误漏洞

Showing top 20 of 83 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2019-15642

No comments yet


Leave a comment