6.8 Medium
AI Score
Confidence
Low
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.01 Low
EPSS
Percentile
83.0%
Directory traversal vulnerability in Webmin before 1.280, when run on Windows, allows remote attackers to read arbitrary files via \ (backslash) characters in the URL to certain directories under the web root, such as the image directory.
CPE | Name | Operator | Version |
---|---|---|---|
webmin:webmin | webmin | eq | 1.2.50 |
webmin:webmin | webmin | eq | 1.2.30 |
webmin:webmin | webmin | eq | 1.2.60 |
webmin:webmin | webmin | eq | 1.2.40 |
webmin:webmin | webmin | le | 1.2.70 |
jvn.jp/jp/JVN%2367974490/index.html
secunia.com/advisories/20777
securityreason.com/securityalert/1161
securitytracker.com/id?1016375
www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/88_e.html
www.securityfocus.com/archive/1/438149/100/0/threaded
www.securityfocus.com/bid/18613
www.vupen.com/english/advisories/2006/2493
www.webmin.com/changes.html
exchange.xforce.ibmcloud.com/vulnerabilities/27366