Webmin <= 1.910 Remote Command Execution

high Nessus Plugin ID 146488

Synopsis

The remote web server is affected by a remote command execution vulnerability.

Description

A remote command execution vulnerability exists in Package Updates module. An authenticated, remote attacker can exploit this if they are authorized to the Package Updates module via the data parameter to update.cgi in order to execute arbitrary commands with root privileges.

Solution

Upgrade to Webmin 1.920 or later.

See Also

http://www.webmin.com/changes.html

Plugin Details

Severity: High

ID: 146488

File Name: webmin_1_920.nasl

Version: 1.3

Type: remote

Family: CGI abuses

Published: 2/15/2021

Updated: 2/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2019-12840

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:webmin:webmin

Required KB Items: Settings/ParanoidReport, www/webmin

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/15/2019

Vulnerability Publication Date: 6/15/2019

Exploitable With

Metasploit (Webmin Package Updates Remote Command Execution)

Reference Information

CVE: CVE-2019-12840