Skip to content

K3ysTr0K3R/CVE-2019-15107-EXPLOIT

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

30 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

CVE-2019-15107 - Webmin RCE πŸ’»πŸ›‘

The vulnerability is found in the 'old' parameter within the 'password_change.cgi' file of Webmin. It is prone to command injection attacks, allowing malicious actors to execute arbitrary commands by exploiting this weakness in the application.

🚨 Disclaimer

Please be aware that this exploit is provided solely for educational and research purposes. Any actions you undertake using this code are entirely your responsibility. The author(s) of this repository are not responsible for any misuse or damage caused.

πŸ” Use this exploit responsibly and exclusively on authorized systems with proper permissions.

🀝 Contributing

Contributions are highly appreciated! If you encounter any issues or have suggestions for enhancements, feel free to open an issue or submit a pull request.

About

A PoC exploit for CVE-2019-15107 - Webmin Remote Code Execution

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •  

Languages