Webmin 远程代码执行漏洞 (CVE-2019-15642)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

## [CVE-2019-15642 – Authenticated RCE on Webmin <= 1.920](https://www.calypt.com/blog/index.php/authenticated-rce-on-webmin/) Published on: Jul 31 2019 by Loïc ------ ![](https://images.seebug.org/1567395318212-w331s) ## Rpc.cgi After the [XXE](https://www.calypt.com/blog/index.php/authenticated-xxe-on-webmin/), we found another bug in [Webmin](http://www.webmin.com/). This time it’s [*rpc.cgi*](https://github.com/webmin/webmin/blob/master/rpc.cgi) wich is vulnerable. More precisely a call to “unserialise_variable” function is done before than checking if the current user is root, admin or sysadm. As parameter of “unserialise_variable”, there is the content of the HTTP POST request : ![](https://images.seebug.org/1567395330254-w331s) ## Web-lib-funcs.pl In order to call *rpc.cgi* and trigger the vulnerability we need 2 prerequisites : - **User-agent set to “webmin”** (Webmin interprets this as log with basic auth rather than session cookie) ; - **Valid Basic auth** for a user of...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息