Vulnerabilities > CVE-2004-1468
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The web mail functionality in Usermin 1.x and Webmin 1.x allows remote attackers to execute arbitrary commands via shell metacharacters in an e-mail message.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 9 | |
Application | 13 |
Nessus
NASL family CGI abuses NASL id WEBMIN_1_160.NASL description According to its self-reported version, the Webmin install hosted on the remote host is 1.x prior to 1.160. It is, therefore, affected by a remote code execution vulnerability. last seen 2020-06-01 modified 2020-06-02 plugin id 108546 published 2018-03-22 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/108546 title Webmin 1.x < 1.160 Remote Code Execution NASL family Debian Local Security Checks NASL id DEBIAN_DSA-544.NASL description Ludwig Nussel discovered a problem in webmin, a web-based administration toolkit. A temporary directory was used but without checking for the previous owner. This could allow an attacker to create the directory and place dangerous symbolic links inside. last seen 2020-06-01 modified 2020-06-02 plugin id 15381 published 2004-09-29 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/15381 title Debian DSA-544-1 : webmin - insecure temporary directory NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200409-15.NASL description The remote host is affected by the vulnerability described in GLSA-200409-15 (Webmin, Usermin: Multiple vulnerabilities in Usermin) There is an input validation bug in the webmail feature of Usermin. Additionally, the Webmin and Usermin installation scripts write to /tmp/.webmin without properly checking if it exists first. Impact : The first vulnerability allows a remote attacker to inject arbitrary shell code in a specially crafted e-mail. This could lead to remote code execution with the privileges of the user running Webmin or Usermin. The second could allow local users who know Webmin or Usermin is going to be installed to have arbitrary files be overwritten by creating a symlink by the name /tmp/.webmin that points to some target file, e.g. /etc/passwd. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 14705 published 2004-09-12 reporter This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/14705 title GLSA-200409-15 : Webmin, Usermin: Multiple vulnerabilities in Usermin