Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
16 changes: 16 additions & 0 deletions webmin/CVE-2019-15107/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
# Webmin Unauthenticated Remote Code Execution (CVE-2019-15107)
CVE-2019-15107 is a vulnerability in Webmin versions 1.890 to 1.920 that allows an attacker to execute arbitrary commands as root. The vulnerability is due to the way Webmin handles user input in the password change form. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the Webmin server. This allows the attacker to execute arbitrary commands as root on the affected system.

## Docker-compose
You can deploy the vulnerable version of Webmin by running in docker-compose:
```sh
docker-compose -f docker-compose.yml up
```
It takes several minutes to wait for the service to be accessed normally, and the exposed web service port is [10000].

## Kubernetes
Or you can deploy the vulnerable version of Webmin by running in Kubernetes:
```sh
kubectl apply -f webmin-cve-2019-15107.yaml
```
The Kubernetes deployment will create a service named `webmin-cve-2019-15107` listening on port `10000`.
7 changes: 7 additions & 0 deletions webmin/CVE-2019-15107/docker-compose.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
version: '3'
services:
cve-2019-15107:
image: githhhunter/cve-2019-15107:latest
ports:
- "10000:10000"
restart: always
32 changes: 32 additions & 0 deletions webmin/CVE-2019-15107/webmin-cve-2019-15107.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: cve-2019-15107-deployment
spec:
replicas: 1
selector:
matchLabels:
app: cve-2019-15107
template:
metadata:
labels:
app: cve-2019-15107
spec:
containers:
- name: cve-2019-15107-container
image: githhhunter/cve-2019-15107:latest
ports:
- containerPort: 10000
---
apiVersion: v1
kind: Service
metadata:
name: cve-2019-15107-service
spec:
selector:
app: cve-2019-15107
ports:
- protocol: TCP
port: 10000
targetPort: 10000
type: LoadBalancer