CSRF exists in Webmin 1.850. By sending a GET request to at/create_job.cgi containing dir=/&cmd= in the URI, an attacker to execute arbitrary commands.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://www.webmin.com/security.html | vendor advisory |
https://github.com/webmin/webmin/commit/0c58892732ee7610a7abba5507614366d382c9c9 | third party advisory patch |
https://blogs.securiteam.com/index.php/archives/3430 | third party advisory exploit |
http://www.webmin.com/changes.html | release notes vendor advisory |