Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-15107 PoC — Webmin 命令操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Webmin 命令操作系统命令注入漏洞 (CVE-2019-15107)
Description:An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability.
Description
Exploit para CVE-2019-15107 (Webmin 1.890-1.920) sin credenciales RCE escrito en PYTHON.
Readme
# CVE-2019-15107 Python Exploit

This exploit is for CVE-2019-15107 (Webmin 1.890-1.920) **unauthenticated RCE** implemented in **Python**.

# Usage

```python
python3 webminExploit.py <IP> <PORT> <COMMAND>

python3 webminExploit.py 10.200.198.200 10000 whoami

python3 webminExploit.py 10.200.198.200 10000 "curl -h"
```
File Snapshot

[4.0K] /data/pocs/b172e02344fbe0c3bbb4f971c0a8d65202d2f4e8 ├── [ 322] README.md └── [1.1K] webminExploit.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →