Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-15642 PoC — Webmin 代码注入漏洞

Source
Associated Vulnerability
Title:Webmin 代码注入漏洞 (CVE-2019-15642)
Description:rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify any file on a server, which is why access to it must not be granted to un-trusted Webmin users."
File Snapshot

# Webmin rpc.cgi 后台远程命令执行漏洞 CVE-2019-15642 ## 漏洞描述 Webmin是一套基于Web的用于类Unix操作系统中的系统管理工具。 Webmin 1.92 ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →