Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-15107 PoC — Webmin 命令操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Webmin 命令操作系统命令注入漏洞 (CVE-2019-15107)
Description:An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability.
Description
A PoC exploit for CVE-2019-1510 - Webmin Command Injection.
Readme
# CVE-2019-15107 - Webmin RCE 💻🛑

The vulnerability is found in the 'old' parameter within the 'password_change.cgi' file of Webmin. It is prone to command injection attacks, allowing malicious actors to execute arbitrary commands by exploiting this weakness in the application. 

# 🚨 Disclaimer

Please be aware that this exploit is provided solely for educational and research purposes. Any actions you undertake using this code are entirely your responsibility. The author(s) of this repository are not responsible for any misuse or damage caused.

### 🔐 Use this exploit responsibly and exclusively on authorized systems with proper permissions.

# 🤝 Contributing

Contributions are highly appreciated! If you encounter any issues or have suggestions for enhancements, feel free to open an issue or submit a pull request.
File Snapshot

[4.0K] /data/pocs/879dead98dc593edfae349ebae25afff543ce94a ├── [7.9K] CVE-2019-15107.py ├── [ 841] README.md └── [ 62] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →