Webmin and Usermin do not properly sanitize user input. This vulnerability may allow a remote, unauthenticated user to view any file on the system running Webmin or Usermin.
Webmin
Webmin is popular web-based administration tool for Unix and Linux servers that allows system administrators to make changes to system processes.
Usermin
Usermin offers an interface similar to Webmin, but is designed for regular users who are not responsible for system administration tasks.
The Problem
There is an input validation vulnerability in Usermin and Webmin that could allow a remote, unauthenticated attacker could view any file on the computer running Webmin or Usermin.
An attacker could read any file on the computer running Webmin or Usermin.
Upgrade
Usermin version Version 1.220 and Webmin version 1.290 have been released to address this vulnerability.
Restrict Access
Restrict access to the Webmin and Usermin servers to trusted hosts. Note that in addition to firewall and VPN access control methods, both Webmin and usermin can use SSH tunneling to provide additional layers of encryption and authorization.
999601
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: July 07, 2006
Unknown
The vendor has not provided us with any further information regarding this vulnerability.
This vulnerability was reported by the Webmin team.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23999601 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
The Webmin team has reported this vulnerability.
This document was written by Ryan Giobbi.
CVE IDs: | CVE-2006-3392 |
---|---|
Severity Metric: | 9.53 Date Public: |