module
Webmin Upload Authenticated RCE
Disclosed | Created |
---|---|
01/17/2019 | 03/19/2019 |
Disclosed
01/17/2019
Created
03/19/2019
Description
This module exploits an arbitrary command execution vulnerability in Webmin
1.900 and lower versions. Any user authorized to the "Upload and Download"
module can execute arbitrary commands with root privileges.
In addition, if the 'Running Processes' (proc) privilege is set the user can
accurately determine which directory to upload to. Webmin application files
can be written/overwritten, which allows remote code execution. The module
has been tested successfully with Webmin 1.900 on Ubuntu v18.04.
Using GUESSUPLOAD attempts to use a default installation path in order to
trigger the exploit.
1.900 and lower versions. Any user authorized to the "Upload and Download"
module can execute arbitrary commands with root privileges.
In addition, if the 'Running Processes' (proc) privilege is set the user can
accurately determine which directory to upload to. Webmin application files
can be written/overwritten, which allows remote code execution. The module
has been tested successfully with Webmin 1.900 on Ubuntu v18.04.
Using GUESSUPLOAD attempts to use a default installation path in order to
trigger the exploit.
Authors
AkkuS <Özkan Mustafa Akkuş>Ziconius
Platform
Unix
Architectures
cmd
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:
msf > use exploit/unix/webapp/webmin_upload_exec msf /(c) > show actions ...actions... msf /(c) > set ACTION < action-name > msf /(c) > show options ...show and set options... msf /(c) > run

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.