SB2017070302 - Cross-site scripting in Webmin
Published: July 3, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2017-9313)
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists when processing user-supplied input passed via "sec" HTTP GET parameter to "/man/view_man.cgi" script. A remote authenticated attacker can trick the victim to follow a specially specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Exploitation example:
https://[host]:10000/man/view_man.cgi?page=foo&sec=<script>alert('xss')</script> 2) Cross-site scripting (CVE-ID: CVE-2017-9313)
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists when processing user-supplied input passed via "referers" HTTP GET parameter to "/webmin/change_referers.cgi" script. A remote authenticated attacker can trick the victim to follow a specially specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Exploitation example:
https://[host]:10000/webmin/change_referers.cgi?referer=0&referers=<script>alert('xss')</script> 3) Cross-site scripting (CVE-ID: CVE-2017-9313)
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists when processing user-supplied input passed via "name" HTTP POST parameter to "/acl/save_user.cgi" script. A remote authenticated attacker can trick the victim to follow a specially specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Install update from vendor's website.