Skip to content

Mattb709/CVE-2019-15107-Webmin-RCE-PoC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2019-15107 Webmin RCE PoC

A Python proof-of-concept exploit for CVE-2019-15107 - an unauthenticated remote code execution vulnerability in Webmin versions 1.890 through 1.920.

Description

This vulnerability exists in the /password_change.cgi endpoint of Webmin and allows unauthenticated attackers to execute arbitrary commands with root privileges due to a backdoor in the source code.

Affected Versions

  • Webmin 1.890 through 1.920

Related Tools

For scanning multiple hosts to detect vulnerable systems, check out:
🔍 CVE-2019-15107-Scanner - A companion tool to scan lists of hosts for this vulnerability

Features

  • Vulnerability checking
  • Interactive exploitation menu
  • Direct command execution
  • Color-coded output for better readability
  • Multiple built-in command options

Usage

The exploit is designed to be run with a single target specification, after which it enters an interactive menu for exploitation options.

Basic command:

python CVE-2019-15107-PoC.py --exploit IP:PORT

Example:

python CVE-2019-15107-PoC.py --exploit 94.26.14.68:1111

After running this command, the script will:

  1. Verify if the target is vulnerable
  2. Present an interactive menu if the target is vulnerable

Interactive Menu Options

The menu provides several exploitation options:

1. Execute custom command
2. List system users (/etc/passwd)
3. Get system information (uname -a)
4. List running processes (ps aux)
5. Check current user privileges (whoami)
6. Network information (ifconfig)
7. Exit

Recommended Workflow

  1. Use CVE-2019-15107-Scanner to identify vulnerable hosts
  2. Use CVE-2019-15107-PoC.py to verify and exploit specific targets

Requirements

  • Python 3.x
  • requests library
  • colorama library (for colored output)

Install dependencies with:

pip install requests colorama

Warning

This tool is for educational and authorized testing purposes only. Unauthorized use against systems you don't own or have permission to test is illegal.

References

Disclaimer

The author is not responsible for any misuse of this tool. Use at your own risk and only on systems you have permission to test.

Sample Output

432562990-66aad614-3333-478a-9ed6-b8394f30303c

About

A Python proof-of-concept exploit for CVE-2019-15107 - an unauthenticated remote code execution vulnerability in Webmin versions 1.890 through 1.920.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages