Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-15642

Опубликовано: 26 авг. 2019
Источник: nvd
CVSS3: 8.8
CVSS2: 6.5
EPSS Критический

Описание

rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify any file on a server, which is why access to it must not be granted to un-trusted Webmin users."

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*
Версия до 1.920 (включая)

EPSS

Процентиль: 100%
0.92499
Критический

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 6 лет назад

rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify any file on a server, which is why access to it must not be granted to un-trusted Webmin users."

CVSS3: 8.8
debian
больше 6 лет назад

rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execu ...

CVSS3: 8.8
github
больше 3 лет назад

rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify any file on a server, which is why access to it must not be granted to un-trusted Webmin users."

EPSS

Процентиль: 100%
0.92499
Критический

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-94