Cross-site scripting in Webmin - CVE-2017-9313

 

Cross-site scripting in Webmin - CVE-2017-9313

Published: July 3, 2017


Vulnerability identifier: #VU7287
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P/U:Clear
CVE-ID: CVE-2017-9313
CWE-ID: CWE-79
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Webmin
Affected software:
Webmin

Detailed vulnerability description

Vulnerability allows a remote attacker to perform Cross-site scripting attacks.

An input validation error exists when processing user-supplied input passed via "sec" HTTP GET parameter to "/man/view_man.cgi" script. A remote authenticated attacker can trick the victim to follow a specially specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks. 

Exploitation example:

https://[host]:10000/man/view_man.cgi?page=foo&sec=<script>alert('xss')</script>

How to mitigate CVE-2017-9313

Update to version 1.850.

Sources