Arbitrary command execution can occur in Webmin through 1.962. Any user authorized for the Package Updates module can execute arbitrary commands with root privileges via vectors involving %0A and %0C. NOTE: this issue exists because of an incomplete fix for CVE-2019-12840.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://www.pentest.com.tr/exploits/Webmin-1962-PU-Escape-Bypass-Remote-Command-Execution.html | third party advisory exploit |
https://www.webmin.com/download.html | product |
http://packetstormsecurity.com/files/160676/Webmin-1.962-Remote-Command-Execution.html | exploit vdb entry third party advisory |
https://www.exploit-db.com/exploits/49318 | exploit vdb entry third party advisory |