9
CVSSv2

CVE-2022-0824

Published: 02/03/2022 Updated: 21/11/2022
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 803
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Improper Access Control to Remote Code Execution in GitHub repository webmin/webmin before 1.990.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

webmin webmin

Exploits

In Webmin version 1984, any authenticated low privilege user without access rights to the File Manager module could interact with file manager functionalities such as downloading files from remote URLs and changing file permissions It is possible to achieve remote code execution via a crafted cgi file by chaining those functionalities in the fil ...
Webmin version 1984 authenticated remote code execution exploit ...

Github Repositories

Webmin <=1.984, CVE-2022-0824 Post-Auth Reverse Shell PoC

Webmin-CVE-2022-0824-revshell Vulnerability Description Webmin 1984 and below - File Manager privilege exploit (CVE-2022-0824 and CVE-2022-0829) Less privileged Webmin users who do not have any File Manager module restrictions configured can access files with root privileges, if using the default Authentic theme All systems with additional untrusted Webmin users should upgrad

List of CVE Webmin-CVE-2022-0824-revshell

Deployement of Webmin version 1.984 which is vulnerable to authenticated remote code execution exploit.

CVE-2022-0824 Deployement of Webmin version 1984 which is vulnerable to authenticated remote code execution exploit Description In Webmin version 1984, affecting File Manager module, any authenticated low privilege user without access rights to the File Manager module could interact with file manager functionalities such as download file from remote URL and change file pe

Deployement of Webmin version 1.984 which is vulnerable to authenticated remote code execution exploit.

CVE-2022-0824 Deployement of Webmin version 1984 which is vulnerable to authenticated remote code execution exploit Description In Webmin version 1984, affecting File Manager module, any authenticated low privilege user without access rights to the File Manager module could interact with file manager functionalities such as download file from remote URL and change file pe

Exploit POC for CVE-2022-0824

golang-webmin-CVE-2022-0824-revshell RCE in Webmin &lt;= 1984 CVE-2022-0824 and CVE-2022-0829 This exploits a BAC vuln in Webmin to upload a malicious file, change the permissions on the file, and execute the file The file, created in the makePayload function, is a reverse shell back to an attacker controlled server Usage go run cve-2022-0824go -t "172161

CVE-2022-0824, CVE-2022-0829, File Manger privilege exploit

WebminRCE-exploit CVE-2022-0824, CVE-2022-0829 - File Manger privilege exploit Vulnerable application to test this PoC can be found here as a docker image Prerequisites: Python3 Requests module Description Vulnerability Improper Access Control to Remote Code Execution Safe users (Unpriviledged user) can access File Manager module, which should be restricted by default