Webmin

Webmin

92 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.43%
  • Published 29.12.2020 06:15:13
  • Last modified 21.11.2024 05:28:02

miniserv.pl in Webmin 1.962 on Windows mishandles special characters in query arguments to the CGI program.

Exploit
  • EPSS 81.7%
  • Published 21.12.2020 20:15:12
  • Last modified 21.11.2024 05:27:41

Arbitrary command execution can occur in Webmin through 1.962. Any user authorized for the Package Updates module can execute arbitrary commands with root privileges via vectors involving %0A and %0C. NOTE: this issue exists because of an incomplete ...

  • EPSS 2.48%
  • Published 12.10.2020 16:15:12
  • Last modified 21.11.2024 05:39:30

An Improper Data Validation Vulnerability exists in Webmin 1.941 and earlier affecting the Command Shell Endpoint. A user may enter HTML code into the Command field and submit it. Then, after visiting the Action Logs Menu and displaying logs, the HTM...

  • EPSS 0.34%
  • Published 12.10.2020 16:15:12
  • Last modified 21.11.2024 05:39:30

An XSS Vulnerability exists in Webmin 1.941 and earlier affecting the Cluster Shell Commands Endpoint. A user may enter any XSS Payload into the Command field and execute it. Then, after revisiting the Cluster Shell Commands Menu, the XSS Payload wil...

  • EPSS 0.36%
  • Published 12.10.2020 16:15:12
  • Last modified 21.11.2024 05:00:02

XSS exists in Webmin 1.941 and earlier affecting the Save function of the Read User Email Module / mailboxes Endpoint when attempting to save HTML emails. This module parses any output without sanitizing SCRIPT elements, as opposed to the View functi...

Exploit
  • EPSS 91.53%
  • Published 26.08.2019 18:15:12
  • Last modified 21.11.2024 04:29:11

rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify an...

Exploit
  • EPSS 0.88%
  • Published 26.08.2019 18:15:12
  • Last modified 21.11.2024 04:29:10

xmlrpc.cgi in Webmin through 1.930 allows authenticated XXE attacks. By default, only root, admin, and sysadm can access xmlrpc.cgi.

Warning Exploit
  • EPSS 94.46%
  • Published 16.08.2019 03:15:11
  • Last modified 14.03.2025 17:50:48

An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability.

Exploit
  • EPSS 88.03%
  • Published 15.06.2019 20:29:00
  • Last modified 21.11.2024 04:23:41

In Webmin through 1.910, any user authorized to the "Package Updates" module can execute arbitrary commands with root privileges via the data parameter to update.cgi.

Exploit
  • EPSS 1.63%
  • Published 21.03.2019 16:00:30
  • Last modified 21.11.2024 03:57:30

Webmin 1.890 has XSS via /config.cgi?webmin, the /shell/index.cgi history parameter, /shell/index.cgi?stripped=1, or the /webminlog/search.cgi uall or mall parameter.