Skip to main content

CVE-2022-0824

Description

Improper Access Control to Remote Code Execution in GitHub repository webmin/webmin prior to 1.990.

NVD
Severity: HIGH
CVE ID: CVE-2022-0824
CVSS Score: 8.8
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
huntr.dev
Severity: HIGH
CVE ID: CVE-2022-0824
CVSS Score: 8.3
CVSS Metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L

Refrence: NVDMITRE

Proof Of Concept

Nuclei Templates for CVE-2022-0824
faisalfs10x

Webmin <=1.984, CVE-2022-0824 Post-Auth Reverse Shell PoC

Refrence: GitHub

honypot

Deployement of Webmin version 1.984 which is vulnerable to authenticated remote code execution exploit.

Refrence: GitHub

pizza-power

Exploit POC for CVE-2022-0824

Refrence: GitHub

gokul-ramesh

CVE-2022-0824, CVE-2022-0829, File Manger privilege exploit

Refrence: GitHub

Content on GitHub

kh4sh3i | watchers:4

Webmin-CVE
a Curated list of Webmin vulnerability for penetration tester

Refrence: GitHub