First published: Mon Aug 26 2019(Updated: )
rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify any file on a server, which is why access to it must not be granted to un-trusted Webmin users."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Webmin Webmin | <=1.920 |
https://github.com/webmin/webmin/blob/ab5e00e41ea1ecc1e24b8f8693f3495a0abb1aed/rpc.cgi#L26-L37
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15642 is a vulnerability in Webmin through version 1.920 that allows authenticated Remote Code Execution via a crafted object name.
CVE-2019-15642 has a severity rating of 8.8 (high).
Webmin through version 1.920 is affected by CVE-2019-15642.
CVE-2019-15642 can be exploited by an authenticated attacker through a crafted object name to execute remote code.
Yes, you can find references for CVE-2019-15642 at the following links: [link1], [link2], [link3].