Arbitrary command execution can occur in Webmin through 1.962. Any user authorized for the Package Updates module can execute arbitrary commands with root privileges via vectors involving %0A and %0C. NOTE: this issue exists because of an incomplete fix for CVE-2019-12840.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/160676/Webmin-1.962-Remote-Command-Execution.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/49318 | Exploit Third Party Advisory VDB Entry |
https://www.pentest.com.tr/exploits/Webmin-1962-PU-Escape-Bypass-Remote-Command-Execution.html | Exploit Third Party Advisory |
https://www.webmin.com/download.html | Product |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-12-21T19:19:17
Updated: 2020-12-28T20:30:13
Reserved: 2020-12-21T00:00:00
Link: CVE-2020-35606
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-12-21T20:15:12.617
Modified: 2022-04-26T16:12:50.533
Link: CVE-2020-35606
JSON object: View
Redhat Information
No data.
CWE