Multiple cross-site scripting (XSS) vulnerabilities in pam_login.cgi in Webmin before 1.350 and Usermin before 1.280 allow remote attackers to inject arbitrary web script or HTML via the (1) cid, (2) message, or (3) question parameter. NOTE: some of these details are obtained from third party information.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.webmin.com/security.html | |
http://secunia.com/advisories/25785 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2007/2117 | vdb entry vendor advisory |
http://www.securityfocus.com/bid/24381 | vdb entry patch |
http://www.webmin.com/changes-1.350.html | |
http://security.gentoo.org/glsa/glsa-200707-05.xml | vendor advisory |
http://secunia.com/advisories/25580 | third party advisory patch vendor advisory |
http://osvdb.org/36932 | vdb entry |
http://www.mandriva.com/security/advisories?name=MDKSA-2007:135 | vendor advisory |
http://secunia.com/advisories/25956 | third party advisory vendor advisory |