The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Usermin

vulnerability note CVE-2019-9624

Webmin/Usermin: code execution via Java File Manager / Upload And Download

Synthesis of the vulnerability

An attacker can use a vulnerability via Java File Manager / Upload And Download of Webmin/Usermin, in order to run code.
Impacted products: Usermin, Webmin.
Severity: 1/4.
Consequences: administrator access/rights.
Provenance: privileged account.
Creation date: 08/03/2019.
Identifiers: CVE-2019-9624, VIGILANCE-VUL-28694.

Description of the vulnerability

An attacker can use a vulnerability via Java File Manager / Upload And Download of Webmin/Usermin, in order to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert 20801

Usermin: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of Usermin, in order to run JavaScript code in the context of the web site.
Impacted products: Usermin.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 07/10/2016.
Identifiers: JVN#32504719, VIGILANCE-VUL-20801.

Description of the vulnerability

The Usermin product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of Usermin, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2014-3883 CVE-2014-3884 CVE-2014-3885

Webmin, Usermin: Cross Site Scripting of Popup Windows

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting in Popup Windows of Webmin/Usermin, in order to execute JavaScript code in the context of the web site.
Impacted products: Solaris, Usermin, Webmin.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Number of vulnerabilities in this bulletin: 5.
Creation date: 22/05/2014.
Identifiers: bulletinapr2015, CERTFR-2015-AVI-169, CVE-2014-3883, CVE-2014-3884, CVE-2014-3885, CVE-2014-3886, CVE-2014-3924, VIGILANCE-VUL-14792.

Description of the vulnerability

The Webmin/Usermin product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting in Popup Windows of Webmin/Usermin, in order to execute JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2009-4568

Webmin, Usermin: Cross Site Scripting

Synthesis of the vulnerability

An attacker can generate a Cross Site Scripting in Webmin and Usermin.
Impacted products: Mandriva Linux, OpenSolaris, Usermin, Webmin.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 11/12/2009.
Identifiers: BID-37259, CVE-2009-4568, MDVSA-2010:036, VIGILANCE-VUL-9276.

Description of the vulnerability

A Cross Site Scripting was announced in Webmin and Usermin.



An attacker can thus create a Cross Site Scripting attack, in order to execute Javascript code in the context of the web browser of victim using the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert 7576

Webmin, Usermin: Cross Site Scripting protection

Synthesis of the vulnerability

Webmin and Usermin software are frequently the target of Cross Site Scripting attacks.
Impacted products: Usermin, Webmin.
Severity: 1/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 12/02/2008.
Identifiers: VIGILANCE-VUL-7576.

Description of the vulnerability

Webmin and Usermin software are frequently the target of Cross Site Scripting attacks.

This bulletin does not describe a vulnerability, but a configuration change in Webmin and Usermin to limit the impact to future Cross Site Scripting attacks.

Indeed, Webmin 1.400 and Usermin 1.330 now check the HTTP Referer header before achieving an operation. If the previously visited page is not correct, the operation is rejected.

This configuration change thus limit the impact of Cross Site Scripting which will be discovered.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2008-0720

Webmin, Usermin: Cross Site Scripting of search

Synthesis of the vulnerability

An attacker can generate a Cross Site Scripting in the search feature of Webmin and Usermin.
Impacted products: Usermin, Webmin.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 07/02/2008.
Identifiers: BID-27662, CVE-2008-0720, VIGILANCE-VUL-7554.

Description of the vulnerability

The webmin_search.cgi script permits to do a text search in modules or in help pages.

However, this script does not filter the search text before displaying it in the HTML page.

An attacker can thus create a Cross Site Scripting attack in order to execute Javascript code in the context of the web browser of victim using the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin 6598

Webmin, Usermin: Cross Site Scripting of chooser.cgi

Synthesis of the vulnerability

An attacker can use a special filename in order to generate a Cross Site Scripting in Webmin or Usermin.
Impacted products: Usermin, Webmin.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 01/03/2007.
Identifiers: BID-22748, VIGILANCE-VUL-6598.

Description of the vulnerability

The chooser.cgi script permits to browse the filesystem via Webmin, by displaying directory contents as HTML.

However, special characters contained in filenames are not correctly filtered.

A local attacker can therefore create a special filename in order to generate a Cross Site Scripting attack in web browser of administrator who browses this directory using chooser.cgi.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2006-3392

Webmin, Usermin: file reading

Synthesis of the vulnerability

An unauthenticated attacker can use Webmin or Usermin to read a file from server.
Impacted products: Debian, Mandriva Linux, Usermin, Webmin.
Severity: 3/4.
Consequences: data reading.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 30/06/2006.
Revisions dates: 10/07/2006, 18/07/2006, 03/01/2007.
Identifiers: BID-18744, CERTA-2006-AVI-337, CERTA-2006-AVI-454, CVE-2006-3292-ERROR, CVE-2006-3392, DSA-1199-1, MDKSA-2006:125, VIGILANCE-VUL-5972, VU#999601.

Description of the vulnerability

The miniserv.pl implements the web server of Webmin and Usermin.

The character range from 0x00 of 0x1F contains control characters, such as tabulation or line feed.

The miniserv.pl script uses the simplify_path() function to canonize url, so to suppress for example "dir/..". However, this function does not filter control characters.

An unauthenticated attacker can thus use a special url to read a file located on system.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2006-4542

Webmin, Usermin: source code disclosure and Cross Site Scripting

Synthesis of the vulnerability

An attacker can obtain Webmin/Usermin source code or create a Cross Site Scripting attack.
Impacted products: Debian, Mandriva Linux, Usermin, Webmin.
Severity: 1/4.
Consequences: client access/rights, data reading.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 01/09/2006.
Revision date: 07/09/2006.
Identifiers: BID-19820, CERTA-2006-AVI-382, CERTA-2006-AVI-454, CVE-2006-4542, DSA-1199-1, MDKSA-2006:170, SNS Advisory No.89, VIGILANCE-VUL-6136.

Description of the vulnerability

Two vulnerabilities were announced in Webmin and Usermin.

An attacker can obtain the Perl/CGI source code. As source code is publicly available, this vulnerability only affects installations with custom modules. [severity:1/4]

An attacker can create a special url leading to Javascript code execution in context of users clicking on the link. [severity:1/4]

Both vulnerabilities are related to a bad filter on the null character (%00).
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2006-4246

Usermin: deactivating root's shell

Synthesis of the vulnerability

A local attacker can change root's shell, using Usermin interface.
Impacted products: Debian, Usermin.
Severity: 1/4.
Consequences: data creation/edition.
Provenance: user account.
Creation date: 22/06/2006.
Identifiers: BID-18574, CVE-2006-4246, DSA-1177-1, VIGILANCE-VUL-5944.

Description of the vulnerability

The chsh command permits each user to change his shell:
  chsh -s /bin/newshell username

User can also change his shell via Usermin interface. However, if shell field is left empty, following command is run with root rights:
  chsh -s username
Thus, root's shell becomes "username", and administrator then can not connect to system.

This vulnerability therefore permits an attacker to generate a denial of service.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Usermin: