The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Webmin Multiple Vulnerabilities

Secunia ID



CVE-2012-2981, CVE-2012-2982, CVE-2012-2983, CVE-2012-4893

Release Date

07 Sep 2012

Last Change

25 Sep 2012


Moderately Critical

Solution Status

Vendor Patch


Webmin 1.x


From remote

System access

This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

Cross-Site Scripting

Cross-Site Scripting vulnerabilities allow a third party to manipulate the content or behaviour of a web application in a user's browser, without compromising the underlying system.

Different Cross-Site Scripting related vulnerabilities are also classified under this category, including "script insertion" and "cross-site request forgery".

Cross-Site Scripting vulnerabilities are often used against specific users of a website to steal their credentials or to conduct spoofing attacks.

Exposure of sensitive information

Vulnerabilities where documents or credentials are leaked or can be revealed either locally or from remote.

Security Bypass

This covers vulnerabilities or security issues where malicious users or people can bypass certain security mechanisms of the application.

The actual impact varies significantly depending on the design and purpose of the affected application.


Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to bypass certain security restrictions, conduct cross-site request forgery attacks, and disclose certain sensitive information.

1) Input passed via monitor type name is not properly sanitised in edit_mon.cgi and save_mon.cgi. This can be exploited to inject and execute arbitrary Perl code.

2) Input passed via the path info to show.cgi is not properly sanitised before being used in a "open()" function call. This can be exploited to inject and execute arbitrary shell commands.

3) Input passed via the "file" parameter to edit_html.cgi is not properly verified before being used to read files. This can be exploited to read arbitrary files from local resources.

4) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. edit monitor type names when a logged-in user visits a specially crafted web page.

5) Input passed via HTTP Referer is not properly verified before being used. This can be exploited to bypass a Referer check via a malicious URL with included port number.

The vulnerabilities are reported in versions prior to 1.600.


Update to version 1.600.

Reported by

1 - 4) American Information Security Group.
5) The vendor credits Marcin Teodorczyk

Original Advisory


American Information Security Group:

US-CERT VU#788478: