Multiple vulnerabilities in Webmin



Published: 2022-03-16 | Updated: 2022-11-08
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2022-0824
CVE-2022-0829
CWE-ID CWE-284
CWE-285
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Public exploit code for vulnerability #2 is available.
Vulnerable software
Subscribe
Webmin
Web applications / Remote management & hosting panels

Vendor Webmin

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Improper access control

EUVDB-ID: #VU61395

Risk: Medium

CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:F/RL:O/RC:C]

CVE-ID: CVE-2022-0824

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: Yes

Description

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions within the File Manager module. A remote user can bypass implemented security restrictions and compromise the affected system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Webmin: 1.900 - 1.984

External links

http://github.com/webmin/webmin/commit/39ea464f0c40b325decd6a5bfb7833fa4a142e38
http://huntr.dev/bounties/d0049a96-de90-4b1a-9111-94de1044f295
http://packetstormsecurity.com/files/166240/Webmin-1.984-Remote-Code-Execution.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.

2) Improper Authorization

EUVDB-ID: #VU61396

Risk: Medium

CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2022-0829

CWE-ID: CWE-285 - Improper Authorization

Exploit availability: Yes

Description

The vulnerability allows a remote user to compromise the affected system.

The vulnerability exists due to improper authorization in the File Manager module when using the default Authentic theme. A remote user can execute arbitrary code on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Webmin: 1.900 - 1.984

External links

http://huntr.dev/bounties/f2d0389f-d7d1-4f34-9f9d-268b0a0da05e
http://github.com/webmin/webmin/commit/eeeea3c097f5cc473770119f7ac61f1dcfa671b9


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###