Webmin before 1.296 and Usermin before 1.226 do not properly handle a URL with a null ("%00") character, which allows remote attackers to conduct cross-site scripting (XSS), read CGI program source code, list directories, and possibly execute programs.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://jvn.jp/jp/JVN%2399776858/index.html | third party advisory patch |
http://www.securityfocus.com/bid/19820 | vdb entry |
http://secunia.com/advisories/22114 | third party advisory |
http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/89_e.html | patch vendor advisory |
http://www.vupen.com/english/advisories/2006/3424 | vdb entry vendor advisory |
http://secunia.com/advisories/21690 | patch vendor advisory third party advisory |
http://www.debian.org/security/2006/dsa-1199 | vendor advisory |
http://www.osvdb.org/28338 | vdb entry |
http://secunia.com/advisories/22087 | third party advisory |
http://www.osvdb.org/28337 | vdb entry |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:170 | vendor advisory |
http://securitytracker.com/id?1016776 | vdb entry |
http://webmin.com/security.html | patch |
http://secunia.com/advisories/22556 | third party advisory |
http://securitytracker.com/id?1016777 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28699 | vdb entry |