Vulnerabilites related to gentoo - webmin
CVE-2012-4893 (GCVE-0-2012-4893)
Vulnerability from cvelistv5
Published
2012-09-11 19:00
Modified
2024-09-16 17:53
Severity ?
CWE
  • n/a
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in file/show.cgi in Webmin 1.590 and earlier allow remote attackers to hijack the authentication of privileged users for requests that (1) read files or execute (2) tar, (3) zip, or (4) gzip commands, a different issue than CVE-2012-2982.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:50:17.505Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-001.pdf"
          },
          {
            "name": "VU#788478",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/788478"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://americaninfosec.com/research/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in file/show.cgi in Webmin 1.590 and earlier allow remote attackers to hijack the authentication of privileged users for requests that (1) read files or execute (2) tar, (3) zip, or (4) gzip commands, a different issue than CVE-2012-2982."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-09-11T19:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-001.pdf"
        },
        {
          "name": "VU#788478",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/788478"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://americaninfosec.com/research/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-4893",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in file/show.cgi in Webmin 1.590 and earlier allow remote attackers to hijack the authentication of privileged users for requests that (1) read files or execute (2) tar, (3) zip, or (4) gzip commands, a different issue than CVE-2012-2982."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.americaninfosec.com/research/dossiers/AISG-12-001.pdf",
              "refsource": "MISC",
              "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-001.pdf"
            },
            {
              "name": "VU#788478",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/788478"
            },
            {
              "name": "http://americaninfosec.com/research/index.html",
              "refsource": "MISC",
              "url": "http://americaninfosec.com/research/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-4893",
    "datePublished": "2012-09-11T19:00:00Z",
    "dateReserved": "2012-09-11T00:00:00Z",
    "dateUpdated": "2024-09-16T17:53:18.089Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-2983 (GCVE-0-2012-2983)
Vulnerability from cvelistv5
Published
2012-09-11 18:00
Modified
2024-08-06 19:50
Severity ?
CWE
  • n/a
Summary
file/edit_html.cgi in Webmin 1.590 and earlier does not perform an authorization check before showing a file's unedited contents, which allows remote attackers to read arbitrary files via the file field.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:50:05.319Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-002.pdf"
          },
          {
            "name": "VU#788478",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/788478"
          },
          {
            "name": "1027507",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1027507"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://americaninfosec.com/research/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/webmin/webmin/commit/4cd7bad70e23e4e19be8ccf7b9f245445b2b3b80"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-07-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "file/edit_html.cgi in Webmin 1.590 and earlier does not perform an authorization check before showing a file\u0027s unedited contents, which allows remote attackers to read arbitrary files via the file field."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-04-12T09:00:00",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-002.pdf"
        },
        {
          "name": "VU#788478",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/788478"
        },
        {
          "name": "1027507",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1027507"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://americaninfosec.com/research/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/webmin/webmin/commit/4cd7bad70e23e4e19be8ccf7b9f245445b2b3b80"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2012-2983",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "file/edit_html.cgi in Webmin 1.590 and earlier does not perform an authorization check before showing a file\u0027s unedited contents, which allows remote attackers to read arbitrary files via the file field."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.americaninfosec.com/research/dossiers/AISG-12-002.pdf",
              "refsource": "MISC",
              "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-002.pdf"
            },
            {
              "name": "VU#788478",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/788478"
            },
            {
              "name": "1027507",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1027507"
            },
            {
              "name": "http://americaninfosec.com/research/index.html",
              "refsource": "MISC",
              "url": "http://americaninfosec.com/research/index.html"
            },
            {
              "name": "https://github.com/webmin/webmin/commit/4cd7bad70e23e4e19be8ccf7b9f245445b2b3b80",
              "refsource": "CONFIRM",
              "url": "https://github.com/webmin/webmin/commit/4cd7bad70e23e4e19be8ccf7b9f245445b2b3b80"
            },
            {
              "name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
              "refsource": "CONFIRM",
              "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2012-2983",
    "datePublished": "2012-09-11T18:00:00",
    "dateReserved": "2012-05-30T00:00:00",
    "dateUpdated": "2024-08-06T19:50:05.319Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-2981 (GCVE-0-2012-2981)
Vulnerability from cvelistv5
Published
2012-09-11 18:00
Modified
2024-08-06 19:50
Severity ?
CWE
  • n/a
Summary
Webmin 1.590 and earlier allows remote authenticated users to execute arbitrary Perl code via a crafted file associated with the type (aka monitor type name) parameter.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:50:05.335Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-000.pdf"
          },
          {
            "name": "VU#788478",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/788478"
          },
          {
            "name": "1027507",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1027507"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://americaninfosec.com/research/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/webmin/webmin/commit/ed7365064c189b8f136a9f952062249167d1bd9e"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-07-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Webmin 1.590 and earlier allows remote authenticated users to execute arbitrary Perl code via a crafted file associated with the type (aka monitor type name) parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-04-12T09:00:00",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-000.pdf"
        },
        {
          "name": "VU#788478",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/788478"
        },
        {
          "name": "1027507",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1027507"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://americaninfosec.com/research/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/webmin/webmin/commit/ed7365064c189b8f136a9f952062249167d1bd9e"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2012-2981",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Webmin 1.590 and earlier allows remote authenticated users to execute arbitrary Perl code via a crafted file associated with the type (aka monitor type name) parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.americaninfosec.com/research/dossiers/AISG-12-000.pdf",
              "refsource": "MISC",
              "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-000.pdf"
            },
            {
              "name": "VU#788478",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/788478"
            },
            {
              "name": "1027507",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1027507"
            },
            {
              "name": "http://americaninfosec.com/research/index.html",
              "refsource": "MISC",
              "url": "http://americaninfosec.com/research/index.html"
            },
            {
              "name": "https://github.com/webmin/webmin/commit/ed7365064c189b8f136a9f952062249167d1bd9e",
              "refsource": "CONFIRM",
              "url": "https://github.com/webmin/webmin/commit/ed7365064c189b8f136a9f952062249167d1bd9e"
            },
            {
              "name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
              "refsource": "CONFIRM",
              "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2012-2981",
    "datePublished": "2012-09-11T18:00:00",
    "dateReserved": "2012-05-30T00:00:00",
    "dateUpdated": "2024-08-06T19:50:05.335Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0427 (GCVE-0-2005-0427)
Vulnerability from cvelistv5
Published
2005-02-15 05:00
Modified
2024-08-07 21:13
Severity ?
CWE
  • n/a
Summary
The ebuild of Webmin before 1.170-r3 on Gentoo Linux includes the encrypted root password in the miniserv.users file when building a tbz2 of the webmin package, which allows remote attackers to obtain and possibly crack the encrypted password.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:13:54.183Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=77731"
          },
          {
            "name": "GLSA-200502-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-12.xml"
          },
          {
            "name": "webmin-encrypted-password(19315)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19315"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-02-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The ebuild of Webmin before 1.170-r3 on Gentoo Linux includes the encrypted root password in the miniserv.users file when building a tbz2 of the webmin package, which allows remote attackers to obtain and possibly crack the encrypted password."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=77731"
        },
        {
          "name": "GLSA-200502-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-12.xml"
        },
        {
          "name": "webmin-encrypted-password(19315)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19315"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0427",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The ebuild of Webmin before 1.170-r3 on Gentoo Linux includes the encrypted root password in the miniserv.users file when building a tbz2 of the webmin package, which allows remote attackers to obtain and possibly crack the encrypted password."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=77731",
              "refsource": "MISC",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=77731"
            },
            {
              "name": "GLSA-200502-12",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-12.xml"
            },
            {
              "name": "webmin-encrypted-password(19315)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19315"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0427",
    "datePublished": "2005-02-15T05:00:00",
    "dateReserved": "2005-02-15T00:00:00",
    "dateUpdated": "2024-08-07T21:13:54.183Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-2982 (GCVE-0-2012-2982)
Vulnerability from cvelistv5
Published
2012-09-11 18:00
Modified
2024-08-06 19:50
Severity ?
CWE
  • n/a
Summary
file/show.cgi in Webmin 1.590 and earlier allows remote authenticated users to execute arbitrary commands via an invalid character in a pathname, as demonstrated by a | (pipe) character.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:50:05.315Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-001.pdf"
          },
          {
            "name": "VU#788478",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/788478"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/webmin/webmin/commit/1f1411fe7404ec3ac03e803cfa7e01515e71a213"
          },
          {
            "name": "1027507",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1027507"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://americaninfosec.com/research/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-07-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "file/show.cgi in Webmin 1.590 and earlier allows remote authenticated users to execute arbitrary commands via an invalid character in a pathname, as demonstrated by a | (pipe) character."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-04-12T09:00:00",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-001.pdf"
        },
        {
          "name": "VU#788478",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/788478"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/webmin/webmin/commit/1f1411fe7404ec3ac03e803cfa7e01515e71a213"
        },
        {
          "name": "1027507",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1027507"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://americaninfosec.com/research/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2012-2982",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "file/show.cgi in Webmin 1.590 and earlier allows remote authenticated users to execute arbitrary commands via an invalid character in a pathname, as demonstrated by a | (pipe) character."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.americaninfosec.com/research/dossiers/AISG-12-001.pdf",
              "refsource": "MISC",
              "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-001.pdf"
            },
            {
              "name": "VU#788478",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/788478"
            },
            {
              "name": "https://github.com/webmin/webmin/commit/1f1411fe7404ec3ac03e803cfa7e01515e71a213",
              "refsource": "CONFIRM",
              "url": "https://github.com/webmin/webmin/commit/1f1411fe7404ec3ac03e803cfa7e01515e71a213"
            },
            {
              "name": "1027507",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1027507"
            },
            {
              "name": "http://americaninfosec.com/research/index.html",
              "refsource": "MISC",
              "url": "http://americaninfosec.com/research/index.html"
            },
            {
              "name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
              "refsource": "CONFIRM",
              "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2012-2982",
    "datePublished": "2012-09-11T18:00:00",
    "dateReserved": "2012-05-30T00:00:00",
    "dateUpdated": "2024-08-06T19:50:05.315Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2012-09-11 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in file/show.cgi in Webmin 1.590 and earlier allow remote attackers to hijack the authentication of privileged users for requests that (1) read files or execute (2) tar, (3) zip, or (4) gzip commands, a different issue than CVE-2012-2982.
Impacted products
Vendor Product Version
gentoo webmin *
gentoo webmin 1.140
gentoo webmin 1.150
gentoo webmin 1.160
gentoo webmin 1.170
gentoo webmin 1.180
gentoo webmin 1.200
gentoo webmin 1.210
gentoo webmin 1.220
gentoo webmin 1.230
gentoo webmin 1.240
gentoo webmin 1.260
gentoo webmin 1.270
gentoo webmin 1.280
gentoo webmin 1.290
gentoo webmin 1.300
gentoo webmin 1.310
gentoo webmin 1.320
gentoo webmin 1.330
gentoo webmin 1.340
gentoo webmin 1.370
gentoo webmin 1.380
gentoo webmin 1.390
gentoo webmin 1.400
gentoo webmin 1.410
gentoo webmin 1.420
gentoo webmin 1.430
gentoo webmin 1.440
gentoo webmin 1.450
gentoo webmin 1.470
gentoo webmin 1.480
gentoo webmin 1.500
gentoo webmin 1.510
gentoo webmin 1.520
gentoo webmin 1.530
gentoo webmin 1.550
gentoo webmin 1.560
gentoo webmin 1.570
gentoo webmin 1.580



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE0D872-5567-4B52-AF86-ECEA6B3640B4",
              "versionEndIncluding": "1.590",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.140:*:*:*:*:*:*:*",
              "matchCriteriaId": "708F7A39-3D58-4E48-AE71-A4892CB742F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.150:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FE40C73-F154-4F99-B34D-48B1D090CF9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.160:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE77AF8-2706-40D4-B094-ECA970F7CE4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.170:*:*:*:*:*:*:*",
              "matchCriteriaId": "365B53A4-FDEE-4D2E-A0C2-72D728F57FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.180:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA77B2B5-012D-450A-8BC7-E1EACCB3EC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.200:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D1DF7B-8CB8-42CC-9DDA-C5A1AD879346",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.210:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3470725-212E-4E86-9F06-709BFE7BC99C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.220:*:*:*:*:*:*:*",
              "matchCriteriaId": "2376D29D-C58F-48AD-A52E-639F438D6137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.230:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE3A6060-A8DD-4714-95CF-B330D9F323EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.240:*:*:*:*:*:*:*",
              "matchCriteriaId": "9643F753-6EAC-4054-B1EB-4BFBB4280D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.260:*:*:*:*:*:*:*",
              "matchCriteriaId": "82396947-1347-4365-AB4F-851A702A7F9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.270:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D06F90-97F5-4936-8CFA-256C9941FF5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.280:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E699C5-FE91-4E6A-8242-FB54D596853F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.290:*:*:*:*:*:*:*",
              "matchCriteriaId": "39AC9A61-0789-4089-AAC3-C4E085ABB80D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.300:*:*:*:*:*:*:*",
              "matchCriteriaId": "36649A62-5287-4798-BE59-18954FB5F168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.310:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E196054-BE88-4381-9AE9-89951A9E814B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCF58A8E-2DDC-4391-84F7-A2A4248DB5EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.330:*:*:*:*:*:*:*",
              "matchCriteriaId": "E552C43A-947C-42DD-A914-8A8D89605FDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.340:*:*:*:*:*:*:*",
              "matchCriteriaId": "390A1BA0-C32E-4B64-AF9F-FF95E9366A3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.370:*:*:*:*:*:*:*",
              "matchCriteriaId": "846C3686-82FE-4C5C-892C-7C6D28965A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.380:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7289E38-D1F7-4964-9D6D-CC7845C354A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.390:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA5E7D8-5213-42A1-A543-DE0546250772",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.400:*:*:*:*:*:*:*",
              "matchCriteriaId": "F63C7945-1A73-4267-87A2-5F3380B3BC94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.410:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BADBAF9-BC0D-4143-A2DB-5F30930D7FDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.420:*:*:*:*:*:*:*",
              "matchCriteriaId": "29DDC8F5-8AC6-4007-964C-7A035AEE23AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.430:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0CD0CB1-1648-48BD-BF31-72545FF0C1E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.440:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD95F393-8E6D-4041-9884-DB0E02A132C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.450:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C59749-474C-4205-ADE1-509881CAC84A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.470:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C7CB881-4DAE-4698-BC75-30187D128623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.480:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6725EA-FCFD-4C00-90D9-9B5B552C193B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.500:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C3D974-185F-47CE-9245-32CC26CC5C00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.510:*:*:*:*:*:*:*",
              "matchCriteriaId": "768351BA-C94F-4F6F-99B7-4E27C0F971C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.520:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B50EF46-2777-47CE-BC99-D1D5B17001FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.530:*:*:*:*:*:*:*",
              "matchCriteriaId": "501F941E-609B-46B9-A2E0-B359B2DCBB15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.550:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ABFC5F5-CB70-4102-96F9-F0EEC9BA957F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.560:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA24721-BC9A-40E2-ACAB-AA2D6C26C157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.570:*:*:*:*:*:*:*",
              "matchCriteriaId": "67232DFE-C9D5-479E-8DC6-8F577D3ADBF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.580:*:*:*:*:*:*:*",
              "matchCriteriaId": "8976F845-5268-47BD-A782-5B7B8492DC70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in file/show.cgi in Webmin 1.590 and earlier allow remote attackers to hijack the authentication of privileged users for requests that (1) read files or execute (2) tar, (3) zip, or (4) gzip commands, a different issue than CVE-2012-2982."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en file/show.cgi en Webmin v1.590 y anteriores, permite a atacantes remotos secuestrar la autenticaci\u00f3n de usaurios privilegiados para peticiones que (1) leen archivos o ejecutan comandos (2) tar, (3) zip, o (4) gzip, una cuestion diferente de CVE-2012-2982."
    }
  ],
  "id": "CVE-2012-4893",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-09-11T19:55:00.970",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://americaninfosec.com/research/index.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-001.pdf"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/788478"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://americaninfosec.com/research/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-001.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/788478"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-11 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
file/show.cgi in Webmin 1.590 and earlier allows remote authenticated users to execute arbitrary commands via an invalid character in a pathname, as demonstrated by a | (pipe) character.
Impacted products
Vendor Product Version
gentoo webmin *
gentoo webmin 1.140
gentoo webmin 1.150
gentoo webmin 1.160
gentoo webmin 1.170
gentoo webmin 1.180
gentoo webmin 1.200
gentoo webmin 1.210
gentoo webmin 1.220
gentoo webmin 1.230
gentoo webmin 1.240
gentoo webmin 1.260
gentoo webmin 1.270
gentoo webmin 1.280
gentoo webmin 1.290
gentoo webmin 1.300
gentoo webmin 1.310
gentoo webmin 1.320
gentoo webmin 1.330
gentoo webmin 1.340
gentoo webmin 1.370
gentoo webmin 1.380
gentoo webmin 1.390
gentoo webmin 1.400
gentoo webmin 1.410
gentoo webmin 1.420
gentoo webmin 1.430
gentoo webmin 1.440
gentoo webmin 1.450
gentoo webmin 1.470
gentoo webmin 1.480
gentoo webmin 1.500
gentoo webmin 1.510
gentoo webmin 1.520
gentoo webmin 1.530
gentoo webmin 1.550
gentoo webmin 1.560
gentoo webmin 1.570
gentoo webmin 1.580



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE0D872-5567-4B52-AF86-ECEA6B3640B4",
              "versionEndIncluding": "1.590",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.140:*:*:*:*:*:*:*",
              "matchCriteriaId": "708F7A39-3D58-4E48-AE71-A4892CB742F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.150:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FE40C73-F154-4F99-B34D-48B1D090CF9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.160:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE77AF8-2706-40D4-B094-ECA970F7CE4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.170:*:*:*:*:*:*:*",
              "matchCriteriaId": "365B53A4-FDEE-4D2E-A0C2-72D728F57FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.180:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA77B2B5-012D-450A-8BC7-E1EACCB3EC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.200:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D1DF7B-8CB8-42CC-9DDA-C5A1AD879346",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.210:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3470725-212E-4E86-9F06-709BFE7BC99C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.220:*:*:*:*:*:*:*",
              "matchCriteriaId": "2376D29D-C58F-48AD-A52E-639F438D6137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.230:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE3A6060-A8DD-4714-95CF-B330D9F323EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.240:*:*:*:*:*:*:*",
              "matchCriteriaId": "9643F753-6EAC-4054-B1EB-4BFBB4280D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.260:*:*:*:*:*:*:*",
              "matchCriteriaId": "82396947-1347-4365-AB4F-851A702A7F9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.270:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D06F90-97F5-4936-8CFA-256C9941FF5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.280:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E699C5-FE91-4E6A-8242-FB54D596853F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.290:*:*:*:*:*:*:*",
              "matchCriteriaId": "39AC9A61-0789-4089-AAC3-C4E085ABB80D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.300:*:*:*:*:*:*:*",
              "matchCriteriaId": "36649A62-5287-4798-BE59-18954FB5F168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.310:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E196054-BE88-4381-9AE9-89951A9E814B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCF58A8E-2DDC-4391-84F7-A2A4248DB5EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.330:*:*:*:*:*:*:*",
              "matchCriteriaId": "E552C43A-947C-42DD-A914-8A8D89605FDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.340:*:*:*:*:*:*:*",
              "matchCriteriaId": "390A1BA0-C32E-4B64-AF9F-FF95E9366A3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.370:*:*:*:*:*:*:*",
              "matchCriteriaId": "846C3686-82FE-4C5C-892C-7C6D28965A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.380:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7289E38-D1F7-4964-9D6D-CC7845C354A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.390:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA5E7D8-5213-42A1-A543-DE0546250772",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.400:*:*:*:*:*:*:*",
              "matchCriteriaId": "F63C7945-1A73-4267-87A2-5F3380B3BC94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.410:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BADBAF9-BC0D-4143-A2DB-5F30930D7FDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.420:*:*:*:*:*:*:*",
              "matchCriteriaId": "29DDC8F5-8AC6-4007-964C-7A035AEE23AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.430:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0CD0CB1-1648-48BD-BF31-72545FF0C1E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.440:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD95F393-8E6D-4041-9884-DB0E02A132C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.450:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C59749-474C-4205-ADE1-509881CAC84A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.470:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C7CB881-4DAE-4698-BC75-30187D128623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.480:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6725EA-FCFD-4C00-90D9-9B5B552C193B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.500:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C3D974-185F-47CE-9245-32CC26CC5C00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.510:*:*:*:*:*:*:*",
              "matchCriteriaId": "768351BA-C94F-4F6F-99B7-4E27C0F971C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.520:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B50EF46-2777-47CE-BC99-D1D5B17001FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.530:*:*:*:*:*:*:*",
              "matchCriteriaId": "501F941E-609B-46B9-A2E0-B359B2DCBB15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.550:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ABFC5F5-CB70-4102-96F9-F0EEC9BA957F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.560:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA24721-BC9A-40E2-ACAB-AA2D6C26C157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.570:*:*:*:*:*:*:*",
              "matchCriteriaId": "67232DFE-C9D5-479E-8DC6-8F577D3ADBF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.580:*:*:*:*:*:*:*",
              "matchCriteriaId": "8976F845-5268-47BD-A782-5B7B8492DC70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "file/show.cgi in Webmin 1.590 and earlier allows remote authenticated users to execute arbitrary commands via an invalid character in a pathname, as demonstrated by a | (pipe) character."
    },
    {
      "lang": "es",
      "value": "file/show.cgi en Webmin v1.590 y anteriores permite a usuarios remotos autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de un car\u00e1cter no v\u00e1lido en un nombre de ruta, como se demostr\u00f3 con | (pipe)."
    }
  ],
  "id": "CVE-2012-2982",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-11T18:55:01.237",
  "references": [
    {
      "source": "cret@cert.org",
      "url": "http://americaninfosec.com/research/index.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-001.pdf"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/788478"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securitytracker.com/id?1027507"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/webmin/webmin/commit/1f1411fe7404ec3ac03e803cfa7e01515e71a213"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://americaninfosec.com/research/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-001.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/788478"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1027507"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/webmin/webmin/commit/1f1411fe7404ec3ac03e803cfa7e01515e71a213"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The ebuild of Webmin before 1.170-r3 on Gentoo Linux includes the encrypted root password in the miniserv.users file when building a tbz2 of the webmin package, which allows remote attackers to obtain and possibly crack the encrypted password.
Impacted products
Vendor Product Version
gentoo webmin 1.140
gentoo webmin 1.150
gentoo webmin 1.160
gentoo webmin 1.170
gentoo webmin 1.170



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.140:*:*:*:*:*:*:*",
              "matchCriteriaId": "708F7A39-3D58-4E48-AE71-A4892CB742F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.150:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FE40C73-F154-4F99-B34D-48B1D090CF9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.160:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE77AF8-2706-40D4-B094-ECA970F7CE4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.170:r1:*:*:*:*:*:*",
              "matchCriteriaId": "0540FAE3-5D20-4417-B6F1-15E8BF856D41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.170:r2:*:*:*:*:*:*",
              "matchCriteriaId": "AE50EE6A-5CD3-4F2A-BBE1-2F32F4FBFAB2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ebuild of Webmin before 1.170-r3 on Gentoo Linux includes the encrypted root password in the miniserv.users file when building a tbz2 of the webmin package, which allows remote attackers to obtain and possibly crack the encrypted password."
    },
    {
      "lang": "es",
      "value": "Las compilaciones de Webmin anteriores a la versi\u00f3n 1.170-r3 en Gentoo Linux incluye la contrase\u00f1a cifrada de root en el fichero miniserv.users cuando crea un tbz2 del paquete webmin, lo que permite a atacantes remotos obtener y posiblemente \u0027craquear\u0027 la contrase\u00f1a cifrada."
    }
  ],
  "id": "CVE-2005-0427",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=77731"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-12.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19315"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=77731"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-12.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19315"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-11 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
file/edit_html.cgi in Webmin 1.590 and earlier does not perform an authorization check before showing a file's unedited contents, which allows remote attackers to read arbitrary files via the file field.
Impacted products
Vendor Product Version
gentoo webmin *
gentoo webmin 1.140
gentoo webmin 1.150
gentoo webmin 1.160
gentoo webmin 1.170
gentoo webmin 1.180
gentoo webmin 1.200
gentoo webmin 1.210
gentoo webmin 1.220
gentoo webmin 1.230
gentoo webmin 1.240
gentoo webmin 1.260
gentoo webmin 1.270
gentoo webmin 1.280
gentoo webmin 1.290
gentoo webmin 1.300
gentoo webmin 1.310
gentoo webmin 1.320
gentoo webmin 1.330
gentoo webmin 1.340
gentoo webmin 1.370
gentoo webmin 1.380
gentoo webmin 1.390
gentoo webmin 1.400
gentoo webmin 1.410
gentoo webmin 1.420
gentoo webmin 1.430
gentoo webmin 1.440
gentoo webmin 1.450
gentoo webmin 1.470
gentoo webmin 1.480
gentoo webmin 1.500
gentoo webmin 1.510
gentoo webmin 1.520
gentoo webmin 1.530
gentoo webmin 1.550
gentoo webmin 1.560
gentoo webmin 1.570
gentoo webmin 1.580



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE0D872-5567-4B52-AF86-ECEA6B3640B4",
              "versionEndIncluding": "1.590",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.140:*:*:*:*:*:*:*",
              "matchCriteriaId": "708F7A39-3D58-4E48-AE71-A4892CB742F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.150:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FE40C73-F154-4F99-B34D-48B1D090CF9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.160:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE77AF8-2706-40D4-B094-ECA970F7CE4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.170:*:*:*:*:*:*:*",
              "matchCriteriaId": "365B53A4-FDEE-4D2E-A0C2-72D728F57FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.180:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA77B2B5-012D-450A-8BC7-E1EACCB3EC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.200:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D1DF7B-8CB8-42CC-9DDA-C5A1AD879346",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.210:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3470725-212E-4E86-9F06-709BFE7BC99C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.220:*:*:*:*:*:*:*",
              "matchCriteriaId": "2376D29D-C58F-48AD-A52E-639F438D6137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.230:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE3A6060-A8DD-4714-95CF-B330D9F323EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.240:*:*:*:*:*:*:*",
              "matchCriteriaId": "9643F753-6EAC-4054-B1EB-4BFBB4280D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.260:*:*:*:*:*:*:*",
              "matchCriteriaId": "82396947-1347-4365-AB4F-851A702A7F9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.270:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D06F90-97F5-4936-8CFA-256C9941FF5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.280:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E699C5-FE91-4E6A-8242-FB54D596853F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.290:*:*:*:*:*:*:*",
              "matchCriteriaId": "39AC9A61-0789-4089-AAC3-C4E085ABB80D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.300:*:*:*:*:*:*:*",
              "matchCriteriaId": "36649A62-5287-4798-BE59-18954FB5F168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.310:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E196054-BE88-4381-9AE9-89951A9E814B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCF58A8E-2DDC-4391-84F7-A2A4248DB5EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.330:*:*:*:*:*:*:*",
              "matchCriteriaId": "E552C43A-947C-42DD-A914-8A8D89605FDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.340:*:*:*:*:*:*:*",
              "matchCriteriaId": "390A1BA0-C32E-4B64-AF9F-FF95E9366A3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.370:*:*:*:*:*:*:*",
              "matchCriteriaId": "846C3686-82FE-4C5C-892C-7C6D28965A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.380:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7289E38-D1F7-4964-9D6D-CC7845C354A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.390:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA5E7D8-5213-42A1-A543-DE0546250772",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.400:*:*:*:*:*:*:*",
              "matchCriteriaId": "F63C7945-1A73-4267-87A2-5F3380B3BC94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.410:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BADBAF9-BC0D-4143-A2DB-5F30930D7FDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.420:*:*:*:*:*:*:*",
              "matchCriteriaId": "29DDC8F5-8AC6-4007-964C-7A035AEE23AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.430:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0CD0CB1-1648-48BD-BF31-72545FF0C1E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.440:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD95F393-8E6D-4041-9884-DB0E02A132C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.450:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C59749-474C-4205-ADE1-509881CAC84A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.470:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C7CB881-4DAE-4698-BC75-30187D128623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.480:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6725EA-FCFD-4C00-90D9-9B5B552C193B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.500:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C3D974-185F-47CE-9245-32CC26CC5C00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.510:*:*:*:*:*:*:*",
              "matchCriteriaId": "768351BA-C94F-4F6F-99B7-4E27C0F971C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.520:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B50EF46-2777-47CE-BC99-D1D5B17001FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.530:*:*:*:*:*:*:*",
              "matchCriteriaId": "501F941E-609B-46B9-A2E0-B359B2DCBB15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.550:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ABFC5F5-CB70-4102-96F9-F0EEC9BA957F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.560:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA24721-BC9A-40E2-ACAB-AA2D6C26C157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.570:*:*:*:*:*:*:*",
              "matchCriteriaId": "67232DFE-C9D5-479E-8DC6-8F577D3ADBF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.580:*:*:*:*:*:*:*",
              "matchCriteriaId": "8976F845-5268-47BD-A782-5B7B8492DC70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "file/edit_html.cgi in Webmin 1.590 and earlier does not perform an authorization check before showing a file\u0027s unedited contents, which allows remote attackers to read arbitrary files via the file field."
    },
    {
      "lang": "es",
      "value": "file/edit_html.cgi en Webmin v1.590 y anteriores no realiza una comprobaci\u00f3n de autorizaci\u00f3n antes de mostrar el contenido de un archivo sin editar, lo que permite a atacantes remotos leer archivos de su elecci\u00f3n a trav\u00e9s del campo de archivo."
    }
  ],
  "id": "CVE-2012-2983",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-11T18:55:01.283",
  "references": [
    {
      "source": "cret@cert.org",
      "url": "http://americaninfosec.com/research/index.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-002.pdf"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/788478"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securitytracker.com/id?1027507"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
    },
    {
      "source": "cret@cert.org",
      "url": "https://github.com/webmin/webmin/commit/4cd7bad70e23e4e19be8ccf7b9f245445b2b3b80"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://americaninfosec.com/research/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-002.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/788478"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1027507"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://github.com/webmin/webmin/commit/4cd7bad70e23e4e19be8ccf7b9f245445b2b3b80"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-11 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
Webmin 1.590 and earlier allows remote authenticated users to execute arbitrary Perl code via a crafted file associated with the type (aka monitor type name) parameter.
Impacted products
Vendor Product Version
gentoo webmin *
gentoo webmin 1.140
gentoo webmin 1.150
gentoo webmin 1.160
gentoo webmin 1.170
gentoo webmin 1.180
gentoo webmin 1.200
gentoo webmin 1.210
gentoo webmin 1.220
gentoo webmin 1.230
gentoo webmin 1.240
gentoo webmin 1.260
gentoo webmin 1.270
gentoo webmin 1.280
gentoo webmin 1.290
gentoo webmin 1.300
gentoo webmin 1.310
gentoo webmin 1.320
gentoo webmin 1.330
gentoo webmin 1.340
gentoo webmin 1.370
gentoo webmin 1.380
gentoo webmin 1.390
gentoo webmin 1.400
gentoo webmin 1.410
gentoo webmin 1.420
gentoo webmin 1.430
gentoo webmin 1.440
gentoo webmin 1.450
gentoo webmin 1.470
gentoo webmin 1.480
gentoo webmin 1.500
gentoo webmin 1.510
gentoo webmin 1.520
gentoo webmin 1.530
gentoo webmin 1.550
gentoo webmin 1.560
gentoo webmin 1.570
gentoo webmin 1.580



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE0D872-5567-4B52-AF86-ECEA6B3640B4",
              "versionEndIncluding": "1.590",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.140:*:*:*:*:*:*:*",
              "matchCriteriaId": "708F7A39-3D58-4E48-AE71-A4892CB742F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.150:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FE40C73-F154-4F99-B34D-48B1D090CF9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.160:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE77AF8-2706-40D4-B094-ECA970F7CE4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.170:*:*:*:*:*:*:*",
              "matchCriteriaId": "365B53A4-FDEE-4D2E-A0C2-72D728F57FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.180:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA77B2B5-012D-450A-8BC7-E1EACCB3EC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.200:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D1DF7B-8CB8-42CC-9DDA-C5A1AD879346",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.210:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3470725-212E-4E86-9F06-709BFE7BC99C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.220:*:*:*:*:*:*:*",
              "matchCriteriaId": "2376D29D-C58F-48AD-A52E-639F438D6137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.230:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE3A6060-A8DD-4714-95CF-B330D9F323EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.240:*:*:*:*:*:*:*",
              "matchCriteriaId": "9643F753-6EAC-4054-B1EB-4BFBB4280D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.260:*:*:*:*:*:*:*",
              "matchCriteriaId": "82396947-1347-4365-AB4F-851A702A7F9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.270:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D06F90-97F5-4936-8CFA-256C9941FF5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.280:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E699C5-FE91-4E6A-8242-FB54D596853F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.290:*:*:*:*:*:*:*",
              "matchCriteriaId": "39AC9A61-0789-4089-AAC3-C4E085ABB80D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.300:*:*:*:*:*:*:*",
              "matchCriteriaId": "36649A62-5287-4798-BE59-18954FB5F168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.310:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E196054-BE88-4381-9AE9-89951A9E814B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCF58A8E-2DDC-4391-84F7-A2A4248DB5EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.330:*:*:*:*:*:*:*",
              "matchCriteriaId": "E552C43A-947C-42DD-A914-8A8D89605FDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.340:*:*:*:*:*:*:*",
              "matchCriteriaId": "390A1BA0-C32E-4B64-AF9F-FF95E9366A3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.370:*:*:*:*:*:*:*",
              "matchCriteriaId": "846C3686-82FE-4C5C-892C-7C6D28965A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.380:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7289E38-D1F7-4964-9D6D-CC7845C354A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.390:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA5E7D8-5213-42A1-A543-DE0546250772",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.400:*:*:*:*:*:*:*",
              "matchCriteriaId": "F63C7945-1A73-4267-87A2-5F3380B3BC94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.410:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BADBAF9-BC0D-4143-A2DB-5F30930D7FDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.420:*:*:*:*:*:*:*",
              "matchCriteriaId": "29DDC8F5-8AC6-4007-964C-7A035AEE23AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.430:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0CD0CB1-1648-48BD-BF31-72545FF0C1E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.440:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD95F393-8E6D-4041-9884-DB0E02A132C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.450:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C59749-474C-4205-ADE1-509881CAC84A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.470:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C7CB881-4DAE-4698-BC75-30187D128623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.480:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6725EA-FCFD-4C00-90D9-9B5B552C193B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.500:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C3D974-185F-47CE-9245-32CC26CC5C00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.510:*:*:*:*:*:*:*",
              "matchCriteriaId": "768351BA-C94F-4F6F-99B7-4E27C0F971C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.520:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B50EF46-2777-47CE-BC99-D1D5B17001FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.530:*:*:*:*:*:*:*",
              "matchCriteriaId": "501F941E-609B-46B9-A2E0-B359B2DCBB15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.550:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ABFC5F5-CB70-4102-96F9-F0EEC9BA957F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.560:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA24721-BC9A-40E2-ACAB-AA2D6C26C157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.570:*:*:*:*:*:*:*",
              "matchCriteriaId": "67232DFE-C9D5-479E-8DC6-8F577D3ADBF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gentoo:webmin:1.580:*:*:*:*:*:*:*",
              "matchCriteriaId": "8976F845-5268-47BD-A782-5B7B8492DC70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Webmin 1.590 and earlier allows remote authenticated users to execute arbitrary Perl code via a crafted file associated with the type (aka monitor type name) parameter."
    },
    {
      "lang": "es",
      "value": "Webmin v1.590 y anteriores permite a usuarios remotos autenticados ejecutar cualquier c\u00f3digo Perl de su elecci\u00f3n a trav\u00e9s de un archivo (creado para tal fin) asociado con el par\u00e1metro \u0027type\u0027(tambi\u00e9n conocido como \u0027monitor type name\u0027).\r\n"
    }
  ],
  "id": "CVE-2012-2981",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-11T18:55:01.160",
  "references": [
    {
      "source": "cret@cert.org",
      "url": "http://americaninfosec.com/research/index.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-000.pdf"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/788478"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securitytracker.com/id?1027507"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/webmin/webmin/commit/ed7365064c189b8f136a9f952062249167d1bd9e"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://americaninfosec.com/research/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-000.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/788478"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1027507"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/webmin/webmin/commit/ed7365064c189b8f136a9f952062249167d1bd9e"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}