GLSA Advocate
![Advocate Advocate](/images/ranks/rank-G-1-advocate.gif)
Joined: 12 May 2004 Posts: 2663
|
Posted: Thu Jul 05, 2007 11:26 pm Post subject: [ GLSA 200707-05 ] Webmin, Usermin: Cross-site scripting vul |
|
|
Gentoo Linux Security Advisory
Title: Webmin, Usermin: Cross-site scripting vulnerabilities (GLSA 200707-05)
Severity: low
Exploitable: remote
Date: July 05, 2007
Bug(s): #181385
ID: 200707-05
Synopsis
Webmin and Usermin are vulnerable to cross-site scripting vulnerabilities (XSS).
Background
Webmin is a web-based administrative interface for Unix-like systems. Usermin is a simplified version of Webmin designed for use by normal users rather than system administrators.
Affected Packages
Package: app-admin/webmin
Vulnerable: < 1.350
Unaffected: >= 1.350
Architectures: All supported architectures
Package: app-admin/usermin
Vulnerable: < 1.280
Unaffected: >= 1.280
Architectures: All supported architectures
Description
The pam_login.cgi file does not properly sanitize user input before sending it back as output to the user.
Impact
An unauthenticated attacker could entice a user to browse a specially crafted URL, allowing for the execution of script code in the context of the user's browser and for the theft of browser credentials. This may permit the attacker to login to Webmin or Usermin with the user's permissions.
Workaround
There is no known workaround at this time.
Resolution
All Webmin users should update to the latest stable version: Code: | # emerge --sync
# emerge --ask --verbose --oneshot ">=app-admin/webmin-1.350" | All Usermin users should update to the latest stable version: Code: | # emerge --sync
# emerge --ask --verbose --oneshot ">=app-admin/usermin-1.280" |
References
CVE-2007-3156 |
|