8.1
CVSSv3

CVE-2022-0829

Published: 02/03/2022 Updated: 13/05/2022
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
CVSS v3 Base Score: 8.1 | Impact Score: 5.2 | Exploitability Score: 2.8
VMScore: 490
Vector: AV:N/AC:L/Au:S/C:N/I:P/A:P

Vulnerability Summary

Improper Authorization in GitHub repository webmin/webmin before 1.990.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

webmin webmin

Github Repositories

Webmin <=1.984, CVE-2022-0824 Post-Auth Reverse Shell PoC

Webmin-CVE-2022-0824-revshell Vulnerability Description Webmin 1984 and below - File Manager privilege exploit (CVE-2022-0824 and CVE-2022-0829) Less privileged Webmin users who do not have any File Manager module restrictions configured can access files with root privileges, if using the default Authentic theme All systems with additional untrusted Webmin users should upgrad

CVE-2022-0824, CVE-2022-0829, File Manger privilege exploit

WebminRCE-exploit CVE-2022-0824, CVE-2022-0829 - File Manger privilege exploit Vulnerable application to test this PoC can be found here as a docker image Prerequisites: Python3 Requests module Description Vulnerability Improper Access Control to Remote Code Execution Safe users (Unpriviledged user) can access File Manager module, which should be restricted by default

A Go security vulnerability research tool for searching the CVE Project repository for a particular keyword.

CVEHound A Go security vulnerability research tool for searching the CVE Project repository for a particular keyword Requirements Go Git ripgrep Usage go build // example =&gt; /cvehound keyword $ /cvehound webmin /Users/username/cvelist/2022/0xxx/CVE-2022-0829json: "TITLE": "Improper Authorization in webmin/webmin"

Exploit POC for CVE-2022-0824

golang-webmin-CVE-2022-0824-revshell RCE in Webmin &lt;= 1984 CVE-2022-0824 and CVE-2022-0829 This exploits a BAC vuln in Webmin to upload a malicious file, change the permissions on the file, and execute the file The file, created in the makePayload function, is a reverse shell back to an attacker controlled server Usage go run cve-2022-0824go -t "172161