Webmin 'miniserv.pl' 'username' Parameter Format String

high Nessus Plugin ID 20343

Synopsis

The remote web server is affected by a format string vulnerability.

Description

The version of Webmin installed on the remote host contains a format string flaw when logging failed authentication attempts. Using specially crafted values for the 'username' parameter of the 'session_login.cgi', an attacker could exploit the flaw to crash the affected server or to potentially execute arbitrary code on the affected host under the privileges of the userid in which the Perl script 'miniserv.pl' runs. The default is the root user.

Solution

Upgrade to Webmin version 1.250 or later.

See Also

http://www.nessus.org/u?ba687296

https://www.securityfocus.com/archive/1/archive/1/418093/100/0/threaded

http://www.webmin.com/security.html

Plugin Details

Severity: High

ID: 20343

File Name: webmin_miniserv_username_format_string.nasl

Version: 1.27

Type: remote

Family: CGI abuses

Published: 12/26/2005

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:webmin:webmin

Required KB Items: www/webmin

Exploit Ease: No exploit is required

Exploited by Nessus: true

Patch Publication Date: 11/30/2005

Vulnerability Publication Date: 11/29/2005

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2005-3912

BID: 15629