exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

SNS-88.txt

SNS-88.txt
Posted Jun 27, 2006
Authored by Keigo Yamazaki | Site lac.co.jp

Webmin versions 1.270 and below are susceptible to a directory traversal attack.

tags | advisory
SHA-256 | fa59e3fa0d86976493acec052efc7ea7a7449bd1611072cdf0f932ece26afa50

SNS-88.txt

Change Mirror Download
----------------------------------------------------------------------
SNS Advisory No.88
Webmin Directory Traversal Vulnerability

Problem first discovered on: Sun, 04 Jun 2006
Published on: Fri, 23 Jun 2006
----------------------------------------------------------------------

Severity Level:
---------------
Medium

Overview:
---------
Webmin for Windows contains directory traversal vulnerability that
allows remote attackers to download arbitrary files without authentication.

Problem Description:
--------------------
Webmin is a web-based system administration tool for Unix, MacOS X and
Windows platform.

Webmin 1.270 and earlier versions does not properly handle "\" (backslash).
On Windows platform, this allows attackers to access outside of the public
directory and files.

In default configurations of Webmin, it is required authentication to
access almost directories under top page. But there are some directories
where is not required authentication to access. For example, the directory
which stores the image used before login.

Therefore, by exploiting directory traversal vulnerability from these
directories, the vulnerability allows remote attackers to download the
contents of arbitrary files without authentication.

Affected Versions:
------------------
Webmin (on Windows) Version 1.270 and earlier versions

Solution:
---------
This problem can be addressed by upgrading Webmin to 1.280 or later.

http://www.webmin.com/

Discovered by:
--------------
Keigo Yamazaki (LAC)

Thanks to:
----------
This SNS Advisory is being published in coordination with Information-technology
Promotion Agency, Japan (IPA) and JPCERT/CC.

http://jvn.jp/jp/JVN%2367974490/index.html
http://www.ipa.go.jp/security/vuln/documents/2006/JVN_67974490_webmin.html

Disclaimer:
-----------
The information contained in this advisory may be revised without prior
notice and is provided as it is. Users shall take their own risk when
taking any actions following reading this advisory. LAC Co., Ltd.
shall take no responsibility for any problems, loss or damage caused
by, or by the use of information provided here.

This advisory can be found at the following URL:
http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/88_e.html
----------------------------------------------------------------------


Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close