Faisal Fs ⚔️
Faisal Fs ⚔️
minor update
update cve-id
update version
minor changes to comment out the description line.
@blacktop, i keep getting this error if run command lookup...command scan is running well... ``` $ docker run --rm -v /var/run/docker.sock:/var/run/docker.sock -e MALICE_VT_API=apikey --network="host" malice/engine lookup 87a28a99697452a37fc229b3aa3afe97 FATA[0000] cmd lookup...
Version: v8.1.2 Please/consider remove the Password field and its value in the Users setting to avoid future issues. 
PoC 1: Affected endpoint: `POST http://localhost/website/public/admin/blog/blog/rA0kxlke49` Field: `Title` Parameter: `title` PoC 2: Affected endpoint: `POST http://localhost/website/public/admin/blog/tag/rA0kxlke49` Field: `Name` Parameter: `name` This issue is also reported via huntr.dev https://huntr.dev/bounties/50b2575f-01a2-4202-8d31-aa7f3164fdfb/
Hi @p0dalirius, mind to add Webmin-CVE-2022-0824 authenticated RCE.. This exploit could be done by any less privileged authenticated attacker. Thanks! Reference: https://github.com/faisalfs10x/Webmin-CVE-2022-0824-revshell