Webmin 1.882 <= 1.921 Remote Code Execution (RCE) Vulnerability

Published: 2019-08-19 06:13:45
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Detection Type:
exploit

Solution Type:
Vendor Patch

Summary:
Webmin is prone to a remote code execution (RCE) vulnerability.

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
The parameter old in password_change.cgi contains a command injection vulnerability. The password change module has to be enabled to be exploitable.

Impact:
Successful exploitation would allow an authorized attacker to gain control over the target system.

Affected Versions:
Webmin versions 1.882 to 1.921.

Recommendations:
Update to version 1.930 or later.

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-15105

References:

https://pentest.com.tr/exploits/DEFCON-Webmin-1920-Unauthenticated-Remote-Command-Execution.html
http://webmin.com/security.html

Search
Severity
High
CVSS Score
10.0

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.