Directory traversal vulnerability in Webmin before 1.280, when run on Windows, allows remote attackers to read arbitrary files via \ (backslash) characters in the URL to certain directories under the web root, such as the image directory.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/438149/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27366 | vdb entry |
http://www.webmin.com/changes.html | |
http://securityreason.com/securityalert/1161 | third party advisory |
http://securitytracker.com/id?1016375 | vdb entry |
http://secunia.com/advisories/20777 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2006/2493 | vdb entry |
http://jvn.jp/jp/JVN%2367974490/index.html | third party advisory |
http://www.securityfocus.com/bid/18613 | vdb entry |
http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/88_e.html |