CVE-2006-3392
Webmin < 1.290 / Usermin < 1.220 - Arbitrary File Disclosure
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
11Exploited in Wild
-Decision
Descriptions
Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.
Las aplicaciones Webmin antes de su versión 1.290 y Usermin antes de la 1.220 llaman a la función simplify_path antes de decodificar HTML, lo que permite a atacantes remotos leer ficheros arbitrarios, como se ha demostrado utilizando secuencias "..% 01", evitando de esta manera la supresión del nombre de fichero de las secuencias "../" anteriores a octetos del estilo de "%01". NOTA: Se trata de una vulnerabilidad diferente a CVE-2006-3274.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-07-06 CVE Reserved
- 2006-07-06 CVE Published
- 2006-07-09 First Exploit
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (30)
URL | Tag | Source |
---|---|---|
http://attrition.org/pipermail/vim/2006-July/000923.html | Mailing List | |
http://attrition.org/pipermail/vim/2006-June/000912.html | Mailing List | |
http://www.kb.cert.org/vuls/id/999601 | Third Party Advisory |
|
http://www.securityfocus.com/archive/1/439653/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/440125/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/440466/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/440493/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/18744 | Vdb Entry | |
http://www.webmin.com/changes.html | X_refsource_confirm | |
https://web.archive.org/web/20060722192501/http://secunia.com/advisories/20892 |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/180803 | 2024-08-31 | |
https://www.exploit-db.com/exploits/2017 | 2006-07-15 | |
https://www.exploit-db.com/exploits/1997 | 2006-07-09 | |
https://github.com/IvanGlinkin/CVE-2006-3392 | 2023-03-09 | |
https://github.com/MrEmpy/CVE-2006-3392 | 2023-04-04 | |
https://github.com/g1vi/CVE-2006-3392 | 2023-10-09 | |
https://github.com/Adel-kaka-dz/CVE-2006-3392 | 2021-11-03 | |
https://github.com/0xtz/CVE-2006-3392 | 2020-06-30 | |
https://github.com/kernel-cyber/CVE-2006-3392 | 2022-09-15 | |
https://github.com/gb21oc/ExploitWebmin | 2023-05-01 | |
https://github.com/brosck/CVE-2006-3392 | 2024-07-03 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/20892 | 2018-10-18 | |
http://secunia.com/advisories/21365 | 2018-10-18 | |
http://www.osvdb.org/26772 | 2018-10-18 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/21105 | 2018-10-18 | |
http://secunia.com/advisories/22556 | 2018-10-18 | |
http://security.gentoo.org/glsa/glsa-200608-11.xml | 2018-10-18 | |
http://www.debian.org/security/2006/dsa-1199 | 2018-10-18 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:125 | 2018-10-18 | |
http://www.vupen.com/english/advisories/2006/2612 | 2018-10-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Usermin Search vendor "Usermin" | Usermin Search vendor "Usermin" for product "Usermin" | <= 1.210 Search vendor "Usermin" for product "Usermin" and version " <= 1.210" | - |
Affected
| ||||||
Webmin Search vendor "Webmin" | Webmin Search vendor "Webmin" for product "Webmin" | <= 1.2.80 Search vendor "Webmin" for product "Webmin" and version " <= 1.2.80" | - |
Affected
|