利用 CVE-2022-36446如何提取Webmin最高权限
2022-8-22 09:48:18 Author: 灰帽安全(查看原文) 阅读量:67 收藏

利用 CVE-202-202336446提取 Webmin最高权限

Features

支持 HTTP 和 HTTPS(即使使用字母的自签名证书--insecure)。

--command脚本选项的命令执行。

--interactive查尔斯的选项。

Usage

$ ./CVE-2022-36446.py -h

CVE-2022-36446 - Webmin < 1.997 - Software Package Updates RCE (Authenticated) v1.1 - by @podalirius_

usage: CVE-2022-36446.py [-h] -t TARGET [-k] -u USERNAME -p PASSWORD (-I | -C COMMAND) [-v]

CVE-2022-36446 - Webmin < 1.997 - Software Package Updates RCE (Authenticated)

optional arguments:

-h, --help show this help message and exit

-t TARGET, --target TARGET

URL to the webmin instance

-k, --insecure

-u USERNAME, --username USERNAME

Username to connect to the webmin.

-p PASSWORD, --password PASSWORD

Password to connect to the webmin.

-I, --interactive Interactive console mode.

-C COMMAND, --command COMMAND

Only execute the specified command.

-v, --verbose Verbose mode. (default: False)

Mitigation

Update to Webmin >= 1.997.

Demonstration

Contributing

Pull requests are welcome. Feel free to open an issue if you want to add other features.

大家如何需要poc脚本的请关注公众号“灰帽安全”     


文章来源: http://mp.weixin.qq.com/s?__biz=Mzg2MjYxODQ4Mw==&mid=2247484250&idx=1&sn=6ebed21576195621702c358362b8f945&chksm=ce045546f973dc500996669f17ad667f730d3565b4cbad2a3c60369876cd65a473fd41c8bab3#rd
如有侵权请联系:admin#unsafe.sh