6.5
CVSSv2

CVE-2019-15642

Published: 26/08/2019 Updated: 04/09/2019
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

rpc.cgi in Webmin up to and including 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify any file on a server, which is why access to it must not be granted to un-trusted Webmin users."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

webmin webmin

Github Repositories

Webmin Remote Code Execution (authenticated)

CVE-2019-15642 Webmin Remote Code Execution (authenticated) python Usage: python CVE-2019-15642py xxxxxxxxx:10000 "cat /etc/passwd" 0x01 docker for Webmin cd ~/vulhub/webmin/CVE-2019-15107 docker-compose up -d root@9460493fa985:/# passwd root Webmin > username=root,password=root âš¡ root@jas502n î‚° ~/vulhub/webmin/CVE-2019-15107 î‚° î‚  master î‚