Page 9 of 90 results (0.010 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

XSS exists in Webmin 1.941 and earlier affecting the Save function of the Read User Email Module / mailboxes Endpoint when attempting to save HTML emails. This module parses any output without sanitizing SCRIPT elements, as opposed to the View function, which sanitizes the input correctly. A malicious user can send any JavaScript payload into the message body and execute it if the user decides to save that email. Se presenta una vulnerabilidad de tipo XSS en Webmin versiones 1.941 y anteriores, afectando a la función Save del Endpoint Read User Email Module / mailboxes cuando se intenta guardar correos electrónicos HTML. Este módulo analiza cualquier salida sin sanear los elementos SCRIPT, a diferencia de la función View, que sanea la entrada correctamente. • https://www.webmin.com/security.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

An Improper Data Validation Vulnerability exists in Webmin 1.941 and earlier affecting the Command Shell Endpoint. A user may enter HTML code into the Command field and submit it. Then, after visiting the Action Logs Menu and displaying logs, the HTML code will be rendered (however, JavaScript is not executed). Changes are kept across users. Se presenta una vulnerabilidad de Comprobación de Datos Inapropiada en Webmin versiones 1.941 y anteriores, afectando al Endpoint Command Shell. • https://www.webmin.com/security.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

An XSS Vulnerability exists in Webmin 1.941 and earlier affecting the Cluster Shell Commands Endpoint. A user may enter any XSS Payload into the Command field and execute it. Then, after revisiting the Cluster Shell Commands Menu, the XSS Payload will be rendered and executed. Se presenta una vulnerabilidad de tipo XSS en Webmin versiones 1.941 y anteriores, afectando al Endpoint Cluster Shell Commands. Un usuario puede ingresar cualquier Carga Útil XSS en el campo Command y ejecutarlo. • https://www.webmin.com/security.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 25%CPEs: 1EXPL: 2

rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify any file on a server, which is why access to it must not be granted to un-trusted Webmin users." rpc.cgi en Webmin hasta la version 1.920 permite la ejecución remota de código autenticada a través de un nombre de objeto diseñado porque unserialise_variable realiza una llamada de evaluación. NOTA: la documentación de Webmin_Servers_Index establece que "RPC se puede usar para ejecutar cualquier comando o modificar cualquier archivo en un servidor, por lo que no se debe otorgar acceso a los usuarios de Webmin que no son de confianza". • https://github.com/jas502n/CVE-2019-15642 https://doxfer.webmin.com/Webmin/Webmin_Servers_Index https://github.com/webmin/webmin/blob/ab5e00e41ea1ecc1e24b8f8693f3495a0abb1aed/rpc.cgi#L26-L37 https://github.com/webmin/webmin/commit/df8a43fb4bdc9c858874f72773bcba597ae9432c https://www.calypt.com/blog/index.php/authenticated-rce-on-webmin • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 1

xmlrpc.cgi in Webmin through 1.930 allows authenticated XXE attacks. By default, only root, admin, and sysadm can access xmlrpc.cgi. xmlrpc.cgi en Webmin a través de 1.930 permite ataques XXE autenticados. De forma predeterminada, solo root, admin y sysadm pueden tener acceso a xmlrpc.cgi. • https://www.calypt.com/blog/index.php/authenticated-xxe-on-webmin • CWE-611: Improper Restriction of XML External Entity Reference •