Vulnerabilities
Vulnerable Software
Webmin:  Security Vulnerabilities
miniserv.pl in (1) Webmin before 1.070 and (2) Usermin before 1.000 does not properly handle metacharacters such as line feeds and carriage returns (CRLF) in Base-64 encoded strings during Basic authentication, which allows remote attackers to spoof a session ID and gain root privileges.
CVSS Score
10.0
EPSS Score
0.155
Published
2003-03-03
Webmin 0.92, when installed from an RPM, creates /var/webmin with insecure permissions (world readable), which could allow local users to read the root user's cookie-based authentication credentials and possibly hijack the root user's session using the credentials.
CVSS Score
2.1
EPSS Score
0.001
Published
2002-12-31
The web interface for Webmin 0.92 does not properly quote or filter script code in files that are displayed to the interface, which allows local users to execute script and possibly steal cookies by inserting the script into certain files or fields, such as a real user name entry in the passwd file.
CVSS Score
3.6
EPSS Score
0.001
Published
2002-12-31
Webmin 0.21 through 1.0 uses the same built-in SSL key for all installations, which allows remote attackers to eavesdrop or highjack the SSL session.
CVSS Score
6.4
EPSS Score
0.003
Published
2002-12-31
The Printer Administration module for Webmin 0.990 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the printer name.
CVSS Score
10.0
EPSS Score
0.025
Published
2002-12-31
The RPC module in Webmin 0.21 through 0.99, when installed without root or admin privileges, allows remote attackers to read and write to arbitrary files and execute arbitrary commands via remote_foreign_require and remote_foreign_call requests.
CVSS Score
9.3
EPSS Score
0.049
Published
2002-12-31
Cross-site scripting vulnerability in the authentication page for (1) Webmin 0.96 and (2) Usermin 0.90 allows remote attackers to insert script into an error page and possibly steal cookies.
CVSS Score
7.5
EPSS Score
0.01
Published
2002-08-12
(1) Webmin 0.96 and (2) Usermin 0.90 with password timeouts enabled allow local and possibly remote attackers to bypass authentication and gain privileges via certain control characters in the authentication information, which can force Webmin or Usermin to accept arbitrary username/session ID combinations.
CVSS Score
7.5
EPSS Score
0.006
Published
2002-08-12
run.cgi in Webmin 0.80 and 0.88 creates temporary files with world-writable permissions, which allows local users to execute arbitrary commands.
CVSS Score
4.6
EPSS Score
0.0
Published
2001-12-31
Directory traversal vulnerability in edit_action.cgi of Webmin Directory 0.91 allows attackers to gain privileges via a '..' (dot dot) in the argument.
CVSS Score
10.0
EPSS Score
0.039
Published
2001-12-17


Contact Us

Shodan ® - All rights reserved