Cross-site scripting (XSS) vulnerability in Webmin 1.540 and earlier allows local users to inject arbitrary web script or HTML via a chfn command that changes the real (aka Full Name) field, related to useradmin/index.cgi and useradmin/user-lib.pl.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2011/05/24/7 | mailing list exploit |
http://www.youtube.com/watch?v=CUO7JLIGUf0 | exploit |
http://securitytracker.com/id?1025438 | vdb entry exploit |
http://www.securityfocus.com/archive/1/517658 | mailing list exploit |
https://github.com/webmin/webmin/commit/46e3d3ad195dcdc1af1795c96b6e0dc778fb6881 | patch |
http://openwall.com/lists/oss-security/2011/05/22/1 | mailing list |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:109 | vendor advisory |
http://securityreason.com/securityalert/8264 | third party advisory |
http://javierb.com.ar/2011/04/24/xss-webmin-1-540/ | exploit |
http://www.securityfocus.com/bid/47558 | vdb entry |