#VU71290 Cross-site scripting in Webmin - CVE-2022-36446
Published: January 17, 2023 / Updated: October 12, 2023
Vulnerability identifier: #VU71290
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:A/U:Clear
CVE-ID: CVE-2022-36446
CWE-ID: CWE-79
Exploitation vector: Remote access
Exploit availability:
Public exploit is available
Vulnerable software:
Webmin
Webmin
Software vendor:
Webmin
Webmin
Description
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in software/apt-lib.pl. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Install updates from vendor's website.
External links
- https://github.com/webmin/webmin/compare/1.996...1.997
- https://github.com/webmin/webmin/commit/13f7bf9621a82d93f1e9dbd838d1e22020221bde
- http://packetstormsecurity.com/files/167894/Webmin-1.996-Remote-Code-Execution.html
- https://www.exploit-db.com/exploits/50998
- https://gist.github.com/emirpolatt/cf19d6c0128fa3e25ebb47e09243919b
- http://packetstormsecurity.com/files/168049/Webmin-Package-Updates-Command-Injection.html
- https://github.com/p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE