Webmin
matt@postman:~$ ps -auxwww | grep -i webmin
root 721 0.0 3.1 90944 28716 ? ss 10:58 0:00 /usr/bin/perl /usr/share/webmin/miniserv.pl /etc/webmin/miniserv.conf
As discovered initially, the Webmin instance is running in the security context of the root
user
This would mean that compromising the web application would elevate the current privilege to the root
user
matt@postman:~$ dpkg --list | grep -i webmin
ii webmin 1.910 all web-based administration interface for Unix systems
Additionally, the Webmin instance is severely outdated as identified earlier, 1.910
, and suffers from an authenticated RCE vulnerability
matt@postman:~$ ll /etc/webmin/
total 548
drwxr-xr-x 118 root root 4096 Aug 26 2019 ./
drwxr-xr-x 82 root root 4096 Sep 29 2020 ../
[...REDACTED...]
-rw-r--r-- 1 root root 463 Aug 26 2019 config
-rw-r----- 1 root root 146 Aug 26 2019 Matt.acl
[...REDACTED...]
While checking the configuration directory of the Webmin instance, I found 2 files that suggests a critical information
Webmin ACL
Webmin supports ACL (Access Control List) much like that of Active Directory.
Webmin ACLs are used to control access to the Webmin web-based administration interface on Unix-like systems. They allow administrators to specify which users or groups have access to specific modules and what actions they can perform within those modules. Additionally, Webmin ACLs use a text-based format with rules and directives defined in
<USER>.acl
files. These files specify access rights and restrictions for individual users or groups.
This suggests that the Matt
user might be also a Webmin user
config
The
config
file confirms that the Matt
user is a valid Webmin user
Since the Matt
user has already been compromised, I can now move on to the [[Postman_Privilege_Escalation#[CVE-2019-12840](https //nvd.nist.gov/vuln/detail/CVE-2019-12840)|Privilege Escalation]] phase