Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2022-0824 CVE-2022-0829 |
CWE-ID | CWE-284 CWE-285 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #1 is available. Public exploit code for vulnerability #2 is available. |
Vulnerable software Subscribe |
Webmin Web applications / Remote management & hosting panels |
Vendor | Webmin |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU61395
Risk: Medium
CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:F/RL:O/RC:C]
CVE-ID: CVE-2022-0824
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: Yes
DescriptionThe vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the File Manager module. A remote user can bypass implemented security restrictions and compromise the affected system.
Install updates from vendor's website.
Vulnerable software versionsWebmin: 1.900 - 1.984
External linkshttp://github.com/webmin/webmin/commit/39ea464f0c40b325decd6a5bfb7833fa4a142e38
http://huntr.dev/bounties/d0049a96-de90-4b1a-9111-94de1044f295
http://packetstormsecurity.com/files/166240/Webmin-1.984-Remote-Code-Execution.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.
EUVDB-ID: #VU61396
Risk: Medium
CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2022-0829
CWE-ID:
CWE-285 - Improper Authorization
Exploit availability: Yes
DescriptionThe vulnerability allows a remote user to compromise the affected system.
The vulnerability exists due to improper authorization in the File Manager module when using the default Authentic theme. A remote user can execute arbitrary code on the system.
Install updates from vendor's website.
Vulnerable software versionsWebmin: 1.900 - 1.984
External linkshttp://huntr.dev/bounties/f2d0389f-d7d1-4f34-9f9d-268b0a0da05e
http://github.com/webmin/webmin/commit/eeeea3c097f5cc473770119f7ac61f1dcfa671b9
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.