vendor:
Webmin
by:
SecurityFocus
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: Webmin
Affected Version From: 1
Affected Version To: 1.22
Patch Exists: YES
Related CWE: N/A
CPE: a:webmin:webmin
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Unix
2002
Webmin Directory Traversal Vulnerability
Webmin does not adequately filter '../' sequences from web requests, making it prone to directory traversal attacks. Furthermore, since Webmin is a facility for remote web-based administration of Unix systems, it requires root privileges. This vulnerability could be exploited to effectively disclose any file on a host running the affected software. It may also be possible to edit files or place files on the server. This may lead to a remote root compromise.
Mitigation:
Ensure that Webmin is configured securely and that all requests are properly sanitized.