07 Sep 2012
25 Sep 2012
This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.
Cross-Site Scripting vulnerabilities allow a third party to manipulate the content or behaviour of a web application in a user's browser, without compromising the underlying system.
Different Cross-Site Scripting related vulnerabilities are also classified under this category, including "script insertion" and "cross-site request forgery".
Cross-Site Scripting vulnerabilities are often used against specific users of a website to steal their credentials or to conduct spoofing attacks.
Exposure of sensitive information
Vulnerabilities where documents or credentials are leaked or can be revealed either locally or from remote.
This covers vulnerabilities or security issues where malicious users or people can bypass certain security mechanisms of the application.
The actual impact varies significantly depending on the design and purpose of the affected application.
Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to bypass certain security restrictions, conduct cross-site request forgery attacks, and disclose certain sensitive information.
1) Input passed via monitor type name is not properly sanitised in edit_mon.cgi and save_mon.cgi. This can be exploited to inject and execute arbitrary Perl code.
2) Input passed via the path info to show.cgi is not properly sanitised before being used in a "open()" function call. This can be exploited to inject and execute arbitrary shell commands.
3) Input passed via the "file" parameter to edit_html.cgi is not properly verified before being used to read files. This can be exploited to read arbitrary files from local resources.
4) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. edit monitor type names when a logged-in user visits a specially crafted web page.
5) Input passed via HTTP Referer is not properly verified before being used. This can be exploited to bypass a Referer check via a malicious URL with included port number.
The vulnerabilities are reported in versions prior to 1.600.
Update to version 1.600.
1 - 4) American Information Security Group.
American Information Security Group: