Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-15642

Опубликовано: 26 авг. 2019
Источник: ubuntu
Приоритет: medium
EPSS Критический
CVSS2: 6.5
CVSS3: 8.8

Описание

rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify any file on a server, which is why access to it must not be granted to un-trusted Webmin users."

РелизСтатусПримечание
bionic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

upstream

needs-triage

xenial

DNE

Показывать по

EPSS

Процентиль: 100%
0.92499
Критический

6.5 Medium

CVSS2

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
больше 6 лет назад

rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify any file on a server, which is why access to it must not be granted to un-trusted Webmin users."

CVSS3: 8.8
debian
больше 6 лет назад

rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execu ...

CVSS3: 8.8
github
больше 3 лет назад

rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify any file on a server, which is why access to it must not be granted to un-trusted Webmin users."

EPSS

Процентиль: 100%
0.92499
Критический

6.5 Medium

CVSS2

8.8 High

CVSS3