• Close
  • Back to search

    Webmin edit_html.cgi file Parameter Traversal Arbitrary File Access

    This module exploits a directory traversal in Webmin 1.580. The vulnerability exists in the edit_html.cgi component and allows an authenticated user with access to the File Manager Module to access arbitrary files with root privileges. The module has been tested successfully with Webim 1.580 over Ubuntu 10.04.

    Free Metasploit Download

    Get your copy of the world's leading penetration testing tool

     Download Now

    Module Name

    auxiliary/admin/webmin/edit_html_fileaccess

    Authors

    • Unknown
    • juan vazquez <juan.vazquez [at] metasploit.com>

    References

    Actions

    • Download

    Reliability

    Development

    Module Options

    To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

    msf > use auxiliary/admin/webmin/edit_html_fileaccess msf auxiliary(edit_html_fileaccess) > show actions ...actions... msf auxiliary(edit_html_fileaccess) > set ACTION <action-name> msf auxiliary(edit_html_fileaccess) > show options ...show and set options... msf auxiliary(edit_html_fileaccess) > run

    Related Vulnerabilities

    Related Modules