Description
Webmin before 1.860 has XSS with resultant remote code execution. Under the 'Others/File Manager' menu, there is a 'Download from remote URL' option to download a file from a remote server. After setting up a malicious server, one can wait for a file download request and then send an XSS payload that will lead to Remote Code Execution, as demonstrated by an OS command in the value attribute of a name='cmd' input element.
Exploits (1)
References (4)
Core 4
Core References
Vendor Advisory x_refsource_misc
http://www.webmin.com/security.html
Patch, Third Party Advisory x_refsource_misc
https://github.com/webmin/webmin/commit/0c58892732ee7610a7abba5507614366d382c9c9
Exploit, Third Party Advisory x_refsource_misc
https://blogs.securiteam.com/index.php/archives/3430
Release Notes, Vendor Advisory x_refsource_misc
http://www.webmin.com/changes.html
Scores
CVSS v3
6.1
EPSS
0.0820
EPSS Percentile
92.2%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (1)
webmin/webmin
< 1.850
Published
Oct 19, 2017
Tracked Since
Feb 18, 2026