SB2012091103 - Multiple vulnerabilities in Webmin
Published: September 11, 2012 Updated: February 13, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Cross-site request forgery (CVE-ID: CVE-2012-4893)
The vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.
2) Input validation error (CVE-ID: CVE-2012-2981)
The vulnerability allows a remote #AU# to read and manipulate data.
Webmin 1.590 and earlier allows remote authenticated users to execute arbitrary Perl code via a crafted file associated with the type (aka monitor type name) parameter.
3) Input validation error (CVE-ID: CVE-2012-2982)
The vulnerability allows a remote #AU# to read and manipulate data.
file/show.cgi in Webmin 1.590 and earlier allows remote authenticated users to execute arbitrary commands via an invalid character in a pathname, as demonstrated by a | (pipe) character.
4) Improper Authentication (CVE-ID: CVE-2012-2983)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
file/edit_html.cgi in Webmin 1.590 and earlier does not perform an authorization check before showing a file's unedited contents, which allows remote attackers to read arbitrary files via the file field.
Remediation
Install update from vendor's website.
References
- http://americaninfosec.com/research/index.html
- http://www.americaninfosec.com/research/dossiers/AISG-12-001.pdf
- http://www.kb.cert.org/vuls/id/788478
- http://www.americaninfosec.com/research/dossiers/AISG-12-000.pdf
- http://www.securitytracker.com/id?1027507
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- https://github.com/webmin/webmin/commit/ed7365064c189b8f136a9f952062249167d1bd9e
- https://github.com/webmin/webmin/commit/1f1411fe7404ec3ac03e803cfa7e01515e71a213
- http://www.americaninfosec.com/research/dossiers/AISG-12-002.pdf
- https://github.com/webmin/webmin/commit/4cd7bad70e23e4e19be8ccf7b9f245445b2b3b80