Multiple Cross-site scripting (XSS) vulnerabilities in Webmin before 1.850 allow remote attackers to inject arbitrary web script or HTML via the sec parameter to view_man.cgi, the referers parameter to change_referers.cgi, or the name parameter to save_user.cgi. NOTE: these issues were not fixed in 1.840.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/webmin/webmin/commit/a330e913ee099cb9c586ce1b9267647fc566c1ab | third party advisory patch |
http://seclists.org/bugtraq/2017/Jul/3 | third party advisory exploit |
http://www.securitytracker.com/id/1038814 | third party advisory vdb entry |
https://github.com/webmin/webmin/commit/c2d4a90639afb2403979aa91ba75cb332ae16d1b | third party advisory patch |
http://www.securityfocus.com/bid/99373 | third party advisory vdb entry |
http://www.webmin.com/changes.html | release notes vendor advisory |