vendor:
Webmin
by:
John Page (aka hyp3rlinx)
7,5
CVSS
HIGH
XSS vulnerability that leads to Remote Code Execution
79
CWE
Product Name: Webmin
Affected Version From: 1.850
Affected Version To: 1.850
Patch Exists: YES
Related CWE: N/A
CPE: a:webmin:webmin:1.850
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2019
Webmin v1.850 Remote Command Execution
Under Webmin menu ‘Others/File Manager‘ there is option to download a file from a remote server ‘Download from remote URL‘. By setting up a malicious server we can wait for file download request then send a XSS payload that will lead to Remote Code Execution. Webmin echo back the ‘File Download‘ request status which we can trigger the XSS vulnerability and bypass this Referrer check by setting the domain=webmin-victim-ip.
Mitigation:
The vendor has released patches to address these vulnerabilities.