Vulnerabilities > CVE-2004-1468

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

The web mail functionality in Usermin 1.x and Webmin 1.x allows remote attackers to execute arbitrary commands via shell metacharacters in an e-mail message.

Nessus

  • NASL familyCGI abuses
    NASL idWEBMIN_1_160.NASL
    descriptionAccording to its self-reported version, the Webmin install hosted on the remote host is 1.x prior to 1.160. It is, therefore, affected by a remote code execution vulnerability.
    last seen2020-06-01
    modified2020-06-02
    plugin id108546
    published2018-03-22
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/108546
    titleWebmin 1.x < 1.160 Remote Code Execution
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-544.NASL
    descriptionLudwig Nussel discovered a problem in webmin, a web-based administration toolkit. A temporary directory was used but without checking for the previous owner. This could allow an attacker to create the directory and place dangerous symbolic links inside.
    last seen2020-06-01
    modified2020-06-02
    plugin id15381
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/15381
    titleDebian DSA-544-1 : webmin - insecure temporary directory
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200409-15.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200409-15 (Webmin, Usermin: Multiple vulnerabilities in Usermin) There is an input validation bug in the webmail feature of Usermin. Additionally, the Webmin and Usermin installation scripts write to /tmp/.webmin without properly checking if it exists first. Impact : The first vulnerability allows a remote attacker to inject arbitrary shell code in a specially crafted e-mail. This could lead to remote code execution with the privileges of the user running Webmin or Usermin. The second could allow local users who know Webmin or Usermin is going to be installed to have arbitrary files be overwritten by creating a symlink by the name /tmp/.webmin that points to some target file, e.g. /etc/passwd. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id14705
    published2004-09-12
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/14705
    titleGLSA-200409-15 : Webmin, Usermin: Multiple vulnerabilities in Usermin