CVE-2019-15107 exploit# Webmin 1.890 expired Remote Root
## CVE-2019-15107
Webmin version **1.890** was released with a backdoor that could allow anyone with knowledge of it to execute commands as root. Versions 1.900 to 1.920 also contained a backdoor using similar code, but it was not exploitable in a default Webmin install. Only if the admin had enabled the feature at Webmin -> Webmin Configuration -> Authentication to allow changing of expired passwords could it be used by an attacker.
## Requeriments
you need [pip3](https://help.dreamhost.com/hc/es/articles/115000699011-Usar-pip3-para-instalar-m%C3%B3dulos-de-Python3) to install this packages.
- requests
- argparse
- os
- bs4
## Help Menu
```bash
$ python3 Webmin_exploit.py --help
usage: Webmin_exploit.py [-h] -host IP [-port Port] [-cmd Command]
Webmin 1.890 expired Remote Root POC
optional arguments:
-h, --help show this help message and exit
-host IP Host to attack
-port Port Port of the host ~ 10000 is Default
-cmd Command Command to execute ~ id is Default
python3 Webmin_exploit.py -host target -port 10000 -cmd id
```
## Usage
```bash
$ python3 Webmin_exploit.py -host target -port 10000 -cmd id
```
## Demostration
[
[4.0K] /data/pocs/8be7439aff97aa4ec979857ccdf47ae4943c3373
├── [ 28K] Demostration.png
├── [1.0K] LICENSE
├── [1.3K] README.md
└── [1.9K] Webmin_exploit.py
0 directories, 4 files