CVE-2017-15646

MEDIUM

Webmin < 1.850 - XSS

Title source: rule
STIX 2.1

Description

Webmin before 1.860 has XSS with resultant remote code execution. Under the 'Others/File Manager' menu, there is a 'Download from remote URL' option to download a file from a remote server. After setting up a malicious server, one can wait for a file download request and then send an XSS payload that will lead to Remote Code Execution, as demonstrated by an OS command in the value attribute of a name='cmd' input element.

Exploits (1)

exploitdb WORKING POC
by hyp3rlinx · textwebappscgi
https://www.exploit-db.com/exploits/42989

References (4)

Core 4
Core References
Vendor Advisory x_refsource_misc
http://www.webmin.com/security.html
Exploit, Third Party Advisory x_refsource_misc
https://blogs.securiteam.com/index.php/archives/3430
Release Notes, Vendor Advisory x_refsource_misc
http://www.webmin.com/changes.html

Scores

CVSS v3 6.1
EPSS 0.0820
EPSS Percentile 92.2%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Details

CWE
CWE-79
Status published
Products (1)
webmin/webmin < 1.850
Published Oct 19, 2017
Tracked Since Feb 18, 2026