CVE-2022-0824
Description
Improper Access Control to Remote Code Execution in GitHub repository webmin/webmin prior to 1.990.
NVD
Severity: HIGH
CVE ID: CVE-2022-0824
CVSS Score: 8.8
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
huntr.dev
Severity: HIGH
CVE ID: CVE-2022-0824
CVSS Score: 8.3
CVSS Metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
Proof Of Concept
Nuclei Templates for CVE-2022-0824
Refrence: Project Discovery GitHub
faisalfs10x
Webmin <=1.984, CVE-2022-0824 Post-Auth Reverse Shell PoC
Refrence: GitHub
honypot
Deployement of Webmin version 1.984 which is vulnerable to authenticated remote code execution exploit.
Refrence: GitHub
pizza-power
Exploit POC for CVE-2022-0824
Refrence: GitHub
gokul-ramesh
CVE-2022-0824, CVE-2022-0829, File Manger privilege exploit
Refrence: GitHub
Content on GitHub
kh4sh3i | watchers:4
Webmin-CVE
a Curated list of Webmin vulnerability for penetration tester
Refrence: GitHub