vendor:
Webmin
by:
Emir Polat
9.8
CVSS
CRITICAL
Remote Code Execution
78
CWE
Product Name: Webmin
Affected Version From: 1.996
Affected Version To: 1.997
Patch Exists: YES
Related CWE: CVE-2022-36446
CPE: a:webmin:webmin
Tags: packetstorm,cve2022,webmin,rce,authenticated,edb,cve
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://medium.com/@emirpolat/cve-2022-36446-webmin-1-997-7a9225af3165, https://www.exploit-db.com/exploits/50998, https://github.com/webmin/webmin/compare/1.996...1.997, https://nvd.nist.gov/vuln/detail/CVE-2022-36446, http://packetstormsecurity.com/files/167894/Webmin-1.996-Remote-Code-Execution.html
Nuclei Metadata: {'max-request': 2, 'shodan-query': 'title:"Webmin"', 'vendor': 'webmin', 'product': 'webmin'}
Platforms Tested: Ubuntu 20.04.4 LTS (GNU/Linux 5.4.0-122-generic x86_64)
2022
Webmin 1.996 – Remote Code Execution (RCE) (Authenticated)
A vulnerability in Webmin 1.996 allows an authenticated user to execute arbitrary code on the server. This is due to the lack of input validation in the update.cgi script, which allows an attacker to inject malicious code into the 'u' parameter. This code is then executed by the server when the update is installed.
Mitigation:
Input validation should be implemented to prevent malicious code injection.