ID CVE-2004-0583
Summary The account lockout functionality in (1) Webmin 1.140 and (2) Usermin 1.070 does not parse certain character strings, which allows remote attackers to conduct a brute force attack to guess user IDs and passwords.
References
Vulnerable Configurations
  • cpe:2.3:a:usermin:usermin:1.070
    cpe:2.3:a:usermin:usermin:1.070
  • cpe:2.3:a:webmin:webmin:1.1.40
    cpe:2.3:a:webmin:webmin:1.1.40
  • Debian Debian Linux 3.0
    cpe:2.3:o:debian:debian_linux:3.0
  • cpe:2.3:o:debian:debian_linux:3.0:-:alpha
    cpe:2.3:o:debian:debian_linux:3.0:-:alpha
  • cpe:2.3:o:debian:debian_linux:3.0:-:arm
    cpe:2.3:o:debian:debian_linux:3.0:-:arm
  • cpe:2.3:o:debian:debian_linux:3.0:-:hppa
    cpe:2.3:o:debian:debian_linux:3.0:-:hppa
  • cpe:2.3:o:debian:debian_linux:3.0:-:ia-32
    cpe:2.3:o:debian:debian_linux:3.0:-:ia-32
  • cpe:2.3:o:debian:debian_linux:3.0:-:ia-64
    cpe:2.3:o:debian:debian_linux:3.0:-:ia-64
  • cpe:2.3:o:debian:debian_linux:3.0:-:m68k
    cpe:2.3:o:debian:debian_linux:3.0:-:m68k
  • cpe:2.3:o:debian:debian_linux:3.0:-:mips
    cpe:2.3:o:debian:debian_linux:3.0:-:mips
  • cpe:2.3:o:debian:debian_linux:3.0:-:mipsel
    cpe:2.3:o:debian:debian_linux:3.0:-:mipsel
  • cpe:2.3:o:debian:debian_linux:3.0:-:ppc
    cpe:2.3:o:debian:debian_linux:3.0:-:ppc
  • cpe:2.3:o:debian:debian_linux:3.0:-:s-390
    cpe:2.3:o:debian:debian_linux:3.0:-:s-390
  • cpe:2.3:o:debian:debian_linux:3.0:-:sparc
    cpe:2.3:o:debian:debian_linux:3.0:-:sparc
CVSS
Base: 5.0 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
nessus via4
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200406-15.NASL
    description The remote host is affected by the vulnerability described in GLSA-200406-15 (Usermin: Multiple vulnerabilities) Usermin contains two security vulnerabilities. One fails to properly sanitize email messages that contain malicious HTML or script code and the other could allow an attacker to lock out a valid user by sending an invalid username and password. Impact : By sending a specially crafted e-mail, an attacker can execute arbitrary scripts running in the context of the victim's browser. This can be lead to cookie theft and potentially to compromise of user accounts. Furthermore, an attacker could lock out legitimate users by sending invalid login information. Workaround : There is no known workaround at this time. All users are encouraged to upgrade to the latest available version.
    last seen 2019-02-21
    modified 2015-04-13
    plugin id 14526
    published 2004-08-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=14526
    title GLSA-200406-15 : Usermin: Multiple vulnerabilities
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2004-074.NASL
    description Unknown vulnerability in Webmin 1.140 allows remote attackers to bypass access control rules and gain read access to configuration information for a module. (CVE-2004-0582) The account lockout functionality in Webmin 1.140 does not parse certain character strings, which allows remote attackers to conduct a brute-force attack to guess user IDs and passwords. (CVE-2004-0583) The updated packages are patched to correct the problem.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 14172
    published 2004-07-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=14172
    title Mandrake Linux Security Advisory : webmin (MDKSA-2004:074)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200406-12.NASL
    description The remote host is affected by the vulnerability described in GLSA-200406-12 (Webmin: Multiple vulnerabilities) Webmin contains two security vulnerabilities. One allows any user to view the configuration of any module and the other could allow an attacker to lock out a valid user by sending an invalid username and password. Impact : An authenticated user could use these vulnerabilities to view the configuration of any module thus potentially obtaining important knowledge about configuration settings. Furthermore, an attacker could lock out legitimate users by sending invalid login information. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 14523
    published 2004-08-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=14523
    title GLSA-200406-12 : Webmin: Multiple vulnerabilities
  • NASL family CGI abuses
    NASL id WEBMIN_1_150.NASL
    description According to its self-reported version, the Webmin install hosted on the remote host is 1.140. It is, therefore, affected by multiple vulnerabilities.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 108545
    published 2018-03-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108545
    title Webmin 1.140 Multiple Vulnerabilities
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-526.NASL
    description Two vulnerabilities were discovered in webmin : CAN-2004-0582: Unknown vulnerability in Webmin 1.140 allows remote attackers to bypass access control rules and gain read access to configuration information for a module. CAN-2004-0583: The account lockout functionality in (1) Webmin 1.140 and (2) Usermin 1.070 does not parse certain character strings, which allows remote attackers to conduct a brute-force attack to guess user IDs and passwords.
    last seen 2019-02-21
    modified 2018-07-20
    plugin id 15363
    published 2004-09-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=15363
    title Debian DSA-526-1 : webmin - several vulnerabilities
refmap via4
bid
  • 10474
  • 10523
bugtraq 20040611 [SNS Advisory No.75] Webmin/Usermin Account Lockout Bypass Vulnerability
confirm http://www.webmin.com/changes-1.150.html
debian DSA-526
gentoo
  • GLSA-200406-12
  • GLSA-200406-15
mandrake MDKSA-2004:074
misc http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/75_e.html
xf webmin-username-password-dos(16334)
Last major update 17-10-2016 - 22:46
Published 06-08-2004 - 00:00
Last modified 10-07-2017 - 21:30
Back to Top