CVE-2012-2983 – Webmin Edit_html.cgi File Parameter Traversal Arbitrary File Access
https://notcve.org/view.php?id=CVE-2012-2983
file/edit_html.cgi in Webmin 1.590 and earlier does not perform an authorization check before showing a file's unedited contents, which allows remote attackers to read arbitrary files via the file field. file/edit_html.cgi en Webmin v1.590 y anteriores no realiza una comprobación de autorización antes de mostrar el contenido de un archivo sin editar, lo que permite a atacantes remotos leer archivos de su elección a través del campo de archivo. • http://americaninfosec.com/research/index.html http://www.americaninfosec.com/research/dossiers/AISG-12-002.pdf http://www.kb.cert.org/vuls/id/788478 http://www.securitytracker.com/id?1027507 http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf https://github.com/webmin/webmin/commit/4cd7bad70e23e4e19be8ccf7b9f245445b2b3b80 • CWE-287: Improper Authentication •
CVE-2012-2982 – Webmin 1.580 - '/file/show.cgi' Remote Command Execution
https://notcve.org/view.php?id=CVE-2012-2982
file/show.cgi in Webmin 1.590 and earlier allows remote authenticated users to execute arbitrary commands via an invalid character in a pathname, as demonstrated by a | (pipe) character. file/show.cgi en Webmin v1.590 y anteriores permite a usuarios remotos autenticados ejecutar código arbitrario a través de un carácter no válido en un nombre de ruta, como se demostró con | (pipe). • https://www.exploit-db.com/exploits/21851 https://github.com/JohnHammond/CVE-2012-2982 https://github.com/cd6629/CVE-2012-2982-Python-PoC https://github.com/0xTas/CVE-2012-2982 https://github.com/OstojaOfficial/CVE-2012-2982 https://github.com/LeDucKhiem/CVE-2012-2982 https://github.com/Ari-Weinberg/CVE-2012-2982 https://github.com/blu3ming/CVE-2012-2982 https://github.com/CpyRe/CVE-2012-2982 https://github.com/elliotosama/CVE-2012-2982 https://github.com/R00te •
CVE-2012-2981
https://notcve.org/view.php?id=CVE-2012-2981
Webmin 1.590 and earlier allows remote authenticated users to execute arbitrary Perl code via a crafted file associated with the type (aka monitor type name) parameter. Webmin v1.590 y anteriores permite a usuarios remotos autenticados ejecutar cualquier código Perl de su elección a través de un archivo (creado para tal fin) asociado con el parámetro 'type'(también conocido como 'monitor type name'). • http://americaninfosec.com/research/index.html http://www.americaninfosec.com/research/dossiers/AISG-12-000.pdf http://www.kb.cert.org/vuls/id/788478 http://www.securitytracker.com/id?1027507 http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf https://github.com/webmin/webmin/commit/ed7365064c189b8f136a9f952062249167d1bd9e • CWE-20: Improper Input Validation •
CVE-2011-1155 – logrotate: DoS due improper escaping of file names within 'write state' action
https://notcve.org/view.php?id=CVE-2011-1155
The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) \n (newline) or (2) \ (backslash) character in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name. La función writeState en logrotate.c en Logrotate v3.7.9 y anteriores podría permitir a atacantes dependientes de contexto provocar una denegación de servicio ('rotation outage') a través de (1) \n (nueva línea) o (2) caracter \ (backslash) en ficheros de traza, como se demuestra en un archivo que es construido automáticamente en la base del nombre de host o nombre de máquina virtual. • http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057845.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056992.html http://openwall.com/lists/oss-security/2011/03/04/16 http://openwall.com/lists/oss-security/2011/03/04/17 http://openwall.com/lists/oss-security/2011/03/04/18 http://openwall.com/lists/oss-security/2011/03/04/19 http://openwall.com/lists/oss-security/2011/03/04/22 http://openwall.com/lists/oss-security/2 • CWE-399: Resource Management Errors •
CVE-2011-1154 – logrotate: Shell command injection by using the shred configuration directive
https://notcve.org/view.php?id=CVE-2011-1154
The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name. La función shred_file en logrotate.c en logrotate v3.7.9 y anteriores puede permitir a atacantes dependiendo del contexto, ejecutar comandos vía metacaracteres de la shell en un fichero de registro, como lo demuestra un nombre de archivo que es contruido de forma automática sobre la base de un nombre de host o máquina virtual. • http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057845.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056992.html http://openwall.com/lists/oss-security/2011/03/04/16 http://openwall.com/lists/oss-security/2011/03/04/17 http://openwall.com/lists/oss-security/2011/03/04/18 http://openwall.com/lists/oss-security/2011/03/04/19 http://openwall.com/lists/oss-security/2011/03/04/22 http://openwall.com/lists/oss-security/2 • CWE-20: Improper Input Validation •