Vulnerabilites related to webmin - usermin
cve-2008-0720
Vulnerability from cvelistv5
Published
2008-02-12 01:00
Modified
2024-08-07 07:54
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Webmin 1.370 and 1.390 and Usermin 1.300 and 1.320 allows remote attackers to inject arbitrary web script or HTML via the search parameter to webmin_search.cgi (aka the search section), and possibly other components accessed through a "search box" or "open file box." NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/487678/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/28827 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/27662 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/487656/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2008/0450 | vdb-entry, x_refsource_VUPEN | |
http://forum.aria-security.net/showthread.php?t=511 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T07:54:23.199Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20080206 Re: Tested on Webmin 1.390", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/487678/100/0/threaded", }, { name: "28827", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/28827", }, { name: "27662", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/27662", }, { name: "20080206 Tested on Webmin 1.390", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/487656/100/0/threaded", }, { name: "ADV-2008-0450", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2008/0450", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://forum.aria-security.net/showthread.php?t=511", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2008-02-06T00:00:00", descriptions: [ { lang: "en", value: "Cross-site scripting (XSS) vulnerability in Webmin 1.370 and 1.390 and Usermin 1.300 and 1.320 allows remote attackers to inject arbitrary web script or HTML via the search parameter to webmin_search.cgi (aka the search section), and possibly other components accessed through a \"search box\" or \"open file box.\" NOTE: some of these details are obtained from third party information.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-15T20:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20080206 Re: Tested on Webmin 1.390", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/487678/100/0/threaded", }, { name: "28827", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/28827", }, { name: "27662", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/27662", }, { name: "20080206 Tested on Webmin 1.390", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/487656/100/0/threaded", }, { name: "ADV-2008-0450", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2008/0450", }, { tags: [ "x_refsource_MISC", ], url: "http://forum.aria-security.net/showthread.php?t=511", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2008-0720", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Cross-site scripting (XSS) vulnerability in Webmin 1.370 and 1.390 and Usermin 1.300 and 1.320 allows remote attackers to inject arbitrary web script or HTML via the search parameter to webmin_search.cgi (aka the search section), and possibly other components accessed through a \"search box\" or \"open file box.\" NOTE: some of these details are obtained from third party information.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20080206 Re: Tested on Webmin 1.390", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/487678/100/0/threaded", }, { name: "28827", refsource: "SECUNIA", url: "http://secunia.com/advisories/28827", }, { name: "27662", refsource: "BID", url: "http://www.securityfocus.com/bid/27662", }, { name: "20080206 Tested on Webmin 1.390", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/487656/100/0/threaded", }, { name: "ADV-2008-0450", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2008/0450", }, { name: "http://forum.aria-security.net/showthread.php?t=511", refsource: "MISC", url: "http://forum.aria-security.net/showthread.php?t=511", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2008-0720", datePublished: "2008-02-12T01:00:00", dateReserved: "2008-02-11T00:00:00", dateUpdated: "2024-08-07T07:54:23.199Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-41162
Vulnerability from cvelistv5
Published
2023-09-13 00:00
Modified
2024-09-25 20:34
Severity ?
EPSS score ?
Summary
A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the file mask field while searching under the tools drop down.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:54:03.501Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://webmin.com/tags/webmin-changelog/", }, { tags: [ "x_transferred", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41162", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-41162", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-25T20:34:15.287690Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-25T20:34:26.746Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the file mask field while searching under the tools drop down.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-13T21:51:18.238302", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://webmin.com/tags/webmin-changelog/", }, { url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41162", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-41162", datePublished: "2023-09-13T00:00:00", dateReserved: "2023-08-24T00:00:00", dateUpdated: "2024-09-25T20:34:26.746Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-41153
Vulnerability from cvelistv5
Published
2023-08-29 00:00
Modified
2024-10-02 13:19
Severity ?
EPSS score ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via options for the host value while editing the host options.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:54:03.538Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://webmin.com/tags/webmin-changelog/", }, { tags: [ "x_transferred", ], url: "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41153", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-41153", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-02T13:18:57.084182Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-02T13:19:05.953Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via options for the host value while editing the host options.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-08-31T22:02:24.740092", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://webmin.com/tags/webmin-changelog/", }, { url: "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41153", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-41153", datePublished: "2023-08-29T00:00:00", dateReserved: "2023-08-24T00:00:00", dateUpdated: "2024-10-02T13:19:05.953Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-41152
Vulnerability from cvelistv5
Published
2023-09-13 00:00
Modified
2024-09-26 13:19
Severity ?
EPSS score ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the handle program field while creating a new MIME type program.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:54:03.732Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://webmin.com/tags/webmin-changelog/", }, { tags: [ "x_transferred", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41152", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-41152", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-26T13:19:25.826234Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-26T13:19:38.230Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the handle program field while creating a new MIME type program.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-13T21:10:43.110819", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://webmin.com/tags/webmin-changelog/", }, { url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41152", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-41152", datePublished: "2023-09-13T00:00:00", dateReserved: "2023-08-24T00:00:00", dateUpdated: "2024-09-26T13:19:38.230Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3884
Vulnerability from cvelistv5
Published
2014-07-20 10:00
Modified
2024-08-06 10:57
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Usermin before 1.600 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this might overlap CVE-2014-3924.
References
▼ | URL | Tags |
---|---|---|
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058 | third-party-advisory, x_refsource_JVNDB | |
http://jvn.jp/en/jp/JVN92737498/index.html | third-party-advisory, x_refsource_JVN |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:57:17.939Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "JVNDB-2014-000058", tags: [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058", }, { name: "JVN#92737498", tags: [ "third-party-advisory", "x_refsource_JVN", "x_transferred", ], url: "http://jvn.jp/en/jp/JVN92737498/index.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-06-20T00:00:00", descriptions: [ { lang: "en", value: "Cross-site scripting (XSS) vulnerability in Usermin before 1.600 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this might overlap CVE-2014-3924.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2014-07-20T06:57:01", orgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", shortName: "jpcert", }, references: [ { name: "JVNDB-2014-000058", tags: [ "third-party-advisory", "x_refsource_JVNDB", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058", }, { name: "JVN#92737498", tags: [ "third-party-advisory", "x_refsource_JVN", ], url: "http://jvn.jp/en/jp/JVN92737498/index.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "vultures@jpcert.or.jp", ID: "CVE-2014-3884", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Cross-site scripting (XSS) vulnerability in Usermin before 1.600 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this might overlap CVE-2014-3924.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "JVNDB-2014-000058", refsource: "JVNDB", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058", }, { name: "JVN#92737498", refsource: "JVN", url: "http://jvn.jp/en/jp/JVN92737498/index.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", assignerShortName: "jpcert", cveId: "CVE-2014-3884", datePublished: "2014-07-20T10:00:00", dateReserved: "2014-05-27T00:00:00", dateUpdated: "2024-08-06T10:57:17.939Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-41161
Vulnerability from cvelistv5
Published
2023-09-07 00:00
Modified
2024-09-26 19:03
Severity ?
EPSS score ?
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the key comment to different pages such as public key details, Export key, sign key, send to key server page, and fetch from key server page tab.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:54:04.354Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://webmin.com/tags/webmin-changelog/", }, { tags: [ "x_transferred", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41161", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-41161", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-26T19:02:48.923529Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-26T19:03:09.539Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the key comment to different pages such as public key details, Export key, sign key, send to key server page, and fetch from key server page tab.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-07T21:09:40.326249", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://webmin.com/tags/webmin-changelog/", }, { url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41161", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-41161", datePublished: "2023-09-07T00:00:00", dateReserved: "2023-08-24T00:00:00", dateUpdated: "2024-09-26T19:03:09.539Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-41154
Vulnerability from cvelistv5
Published
2023-09-13 00:00
Modified
2024-09-26 13:15
Severity ?
EPSS score ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the scheduled cron jobs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the value field parameter while creating a new environment variable.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:54:03.475Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://webmin.com/tags/webmin-changelog/", }, { tags: [ "x_transferred", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41154", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-41154", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-26T13:15:29.354992Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-26T13:15:37.164Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "A Stored Cross-Site Scripting (XSS) vulnerability in the scheduled cron jobs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the value field parameter while creating a new environment variable.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-13T21:08:07.076190", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://webmin.com/tags/webmin-changelog/", }, { url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41154", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-41154", datePublished: "2023-09-13T00:00:00", dateReserved: "2023-08-24T00:00:00", dateUpdated: "2024-09-26T13:15:37.164Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-41157
Vulnerability from cvelistv5
Published
2023-09-16 00:00
Modified
2024-09-25 18:47
Severity ?
EPSS score ?
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the folder name parameter while creating the folder to manage the folder tab, filter tab, and forward mail tab.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:54:04.431Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://webmin.com/tags/webmin-changelog/", }, { tags: [ "x_transferred", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41157", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-41157", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-25T18:47:17.367385Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-25T18:47:25.652Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the folder name parameter while creating the folder to manage the folder tab, filter tab, and forward mail tab.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-16T05:10:09.828159", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://webmin.com/tags/webmin-changelog/", }, { url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41157", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-41157", datePublished: "2023-09-16T00:00:00", dateReserved: "2023-08-24T00:00:00", dateUpdated: "2024-09-25T18:47:25.652Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-36880
Vulnerability from cvelistv5
Published
2022-07-27 03:32
Modified
2024-08-03 10:14
Severity ?
EPSS score ?
Summary
The Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message.
References
▼ | URL | Tags |
---|---|---|
https://www.webmin.com/security.html | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T10:14:29.054Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.webmin.com/security.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-07-27T03:32:30", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.webmin.com/security.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2022-36880", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.webmin.com/security.html", refsource: "MISC", url: "https://www.webmin.com/security.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2022-36880", datePublished: "2022-07-27T03:32:30", dateReserved: "2022-07-27T00:00:00", dateUpdated: "2024-08-03T10:14:29.054Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-36453
Vulnerability from cvelistv5
Published
2024-07-10 07:02
Modified
2024-11-06 21:34
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability exists in session_login.cgi of Webmin versions prior to 1.970 and Usermin versions prior to 1.820. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a webpage may be altered or sensitive information such as a credential may be disclosed.
References
Impacted products
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2024-36453", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-07-10T14:03:38.998862Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-06T21:34:36.873Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T03:37:05.102Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://webmin.com/", }, { tags: [ "x_transferred", ], url: "https://webmin.com/usermin/", }, { tags: [ "x_transferred", ], url: "https://jvn.jp/en/jp/JVN81442045/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Webmin", vendor: "Webmin", versions: [ { status: "affected", version: "versions prior to 1.970", }, ], }, { product: "Usermin", vendor: "Webmin", versions: [ { status: "affected", version: "versions prior to 1.820", }, ], }, ], descriptions: [ { lang: "en", value: "Cross-site scripting vulnerability exists in session_login.cgi of Webmin versions prior to 1.970 and Usermin versions prior to 1.820. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a webpage may be altered or sensitive information such as a credential may be disclosed.", }, ], problemTypes: [ { descriptions: [ { description: "Cross-site scripting (XSS)", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-10T07:02:17.776Z", orgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", shortName: "jpcert", }, references: [ { url: "https://webmin.com/", }, { url: "https://webmin.com/usermin/", }, { url: "https://jvn.jp/en/jp/JVN81442045/", }, ], }, }, cveMetadata: { assignerOrgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", assignerShortName: "jpcert", cveId: "CVE-2024-36453", datePublished: "2024-07-10T07:02:17.776Z", dateReserved: "2024-05-28T05:38:38.739Z", dateUpdated: "2024-11-06T21:34:36.873Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-4897
Vulnerability from cvelistv5
Published
2017-04-12 22:00
Modified
2024-08-06 00:46
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi in Usermin before 1.690.
References
▼ | URL | Tags |
---|---|---|
http://jvn.jp/en/jp/JVN32504719/index.html | third-party-advisory, x_refsource_JVN | |
http://www.securityfocus.com/bid/93477 | vdb-entry, x_refsource_BID | |
http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html | third-party-advisory, x_refsource_JVNDB |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:46:39.250Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "JVN#32504719", tags: [ "third-party-advisory", "x_refsource_JVN", "x_transferred", ], url: "http://jvn.jp/en/jp/JVN32504719/index.html", }, { name: "93477", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/93477", }, { name: "JVNDB-2016-000202", tags: [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred", ], url: "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-10-07T00:00:00", descriptions: [ { lang: "en", value: "Multiple cross-site scripting (XSS) vulnerabilities in (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi in Usermin before 1.690.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-04-12T21:57:01", orgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", shortName: "jpcert", }, references: [ { name: "JVN#32504719", tags: [ "third-party-advisory", "x_refsource_JVN", ], url: "http://jvn.jp/en/jp/JVN32504719/index.html", }, { name: "93477", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/93477", }, { name: "JVNDB-2016-000202", tags: [ "third-party-advisory", "x_refsource_JVNDB", ], url: "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "vultures@jpcert.or.jp", ID: "CVE-2016-4897", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple cross-site scripting (XSS) vulnerabilities in (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi in Usermin before 1.690.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "JVN#32504719", refsource: "JVN", url: "http://jvn.jp/en/jp/JVN32504719/index.html", }, { name: "93477", refsource: "BID", url: "http://www.securityfocus.com/bid/93477", }, { name: "JVNDB-2016-000202", refsource: "JVNDB", url: "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", assignerShortName: "jpcert", cveId: "CVE-2016-4897", datePublished: "2017-04-12T22:00:00", dateReserved: "2016-05-17T00:00:00", dateUpdated: "2024-08-06T00:46:39.250Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-41160
Vulnerability from cvelistv5
Published
2023-09-14 00:00
Modified
2024-09-25 19:22
Severity ?
EPSS score ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the key name field while adding an authorized key.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:54:03.552Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://webmin.com/tags/webmin-changelog/", }, { tags: [ "x_transferred", ], url: "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41160", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-41160", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-25T19:22:34.362404Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-25T19:22:51.517Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the key name field while adding an authorized key.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-14T20:40:46.472788", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://webmin.com/tags/webmin-changelog/", }, { url: "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41160", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-41160", datePublished: "2023-09-14T00:00:00", dateReserved: "2023-08-24T00:00:00", dateUpdated: "2024-09-25T19:22:51.517Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-41159
Vulnerability from cvelistv5
Published
2023-09-14 00:00
Modified
2024-09-25 19:30
Severity ?
EPSS score ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability while editing the autoreply file page in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML by editing the forward file manually.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:54:03.956Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://webmin.com/tags/webmin-changelog/", }, { tags: [ "x_transferred", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41159", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-41159", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-25T19:30:16.854586Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-25T19:30:29.942Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "A Stored Cross-Site Scripting (XSS) vulnerability while editing the autoreply file page in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML by editing the forward file manually.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-14T20:58:25.091676", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://webmin.com/tags/webmin-changelog/", }, { url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41159", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-41159", datePublished: "2023-09-14T00:00:00", dateReserved: "2023-08-24T00:00:00", dateUpdated: "2024-09-25T19:30:29.942Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-41158
Vulnerability from cvelistv5
Published
2023-09-13 00:00
Modified
2024-09-25 20:36
Severity ?
EPSS score ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the description field while creating a new MIME type program.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:54:04.336Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://webmin.com/tags/webmin-changelog/", }, { tags: [ "x_transferred", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41158", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-41158", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-25T20:35:50.024676Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-25T20:36:19.802Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the description field while creating a new MIME type program.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-13T21:19:06.949646", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://webmin.com/tags/webmin-changelog/", }, { url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41158", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-41158", datePublished: "2023-09-13T00:00:00", dateReserved: "2023-08-24T00:00:00", dateUpdated: "2024-09-25T20:36:19.802Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3883
Vulnerability from cvelistv5
Published
2014-06-21 15:00
Modified
2024-08-06 10:57
Severity ?
EPSS score ?
Summary
Usermin before 1.600 allows remote attackers to execute arbitrary operating-system commands via unspecified vectors related to a user action.
References
▼ | URL | Tags |
---|---|---|
https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html | x_refsource_MISC | |
http://jvn.jp/en/jp/JVN48805624/index.html | third-party-advisory, x_refsource_JVN | |
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057 | third-party-advisory, x_refsource_JVNDB |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:57:17.891Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html", }, { name: "JVN#48805624", tags: [ "third-party-advisory", "x_refsource_JVN", "x_transferred", ], url: "http://jvn.jp/en/jp/JVN48805624/index.html", }, { name: "JVNDB-2014-000057", tags: [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-06-20T00:00:00", descriptions: [ { lang: "en", value: "Usermin before 1.600 allows remote attackers to execute arbitrary operating-system commands via unspecified vectors related to a user action.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2014-06-21T15:57:01", orgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", shortName: "jpcert", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html", }, { name: "JVN#48805624", tags: [ "third-party-advisory", "x_refsource_JVN", ], url: "http://jvn.jp/en/jp/JVN48805624/index.html", }, { name: "JVNDB-2014-000057", tags: [ "third-party-advisory", "x_refsource_JVNDB", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "vultures@jpcert.or.jp", ID: "CVE-2014-3883", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Usermin before 1.600 allows remote attackers to execute arbitrary operating-system commands via unspecified vectors related to a user action.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html", refsource: "MISC", url: "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html", }, { name: "JVN#48805624", refsource: "JVN", url: "http://jvn.jp/en/jp/JVN48805624/index.html", }, { name: "JVNDB-2014-000057", refsource: "JVNDB", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", assignerShortName: "jpcert", cveId: "CVE-2014-3883", datePublished: "2014-06-21T15:00:00", dateReserved: "2014-05-27T00:00:00", dateUpdated: "2024-08-06T10:57:17.891Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2007-3156
Vulnerability from cvelistv5
Published
2007-06-11 22:00
Modified
2024-08-07 14:05
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in pam_login.cgi in Webmin before 1.350 and Usermin before 1.280 allow remote attackers to inject arbitrary web script or HTML via the (1) cid, (2) message, or (3) question parameter. NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://www.webmin.com/security.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/25785 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2007/2117 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/24381 | vdb-entry, x_refsource_BID | |
http://www.webmin.com/changes-1.350.html | x_refsource_CONFIRM | |
http://security.gentoo.org/glsa/glsa-200707-05.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/25580 | third-party-advisory, x_refsource_SECUNIA | |
http://osvdb.org/36932 | vdb-entry, x_refsource_OSVDB | |
http://www.mandriva.com/security/advisories?name=MDKSA-2007:135 | vendor-advisory, x_refsource_MANDRIVA | |
http://secunia.com/advisories/25956 | third-party-advisory, x_refsource_SECUNIA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T14:05:29.294Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.webmin.com/security.html", }, { name: "25785", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25785", }, { name: "ADV-2007-2117", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2007/2117", }, { name: "24381", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/24381", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.webmin.com/changes-1.350.html", }, { name: "GLSA-200707-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-200707-05.xml", }, { name: "25580", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25580", }, { name: "36932", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/36932", }, { name: "MDKSA-2007:135", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:135", }, { name: "25956", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25956", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2007-06-08T00:00:00", descriptions: [ { lang: "en", value: "Multiple cross-site scripting (XSS) vulnerabilities in pam_login.cgi in Webmin before 1.350 and Usermin before 1.280 allow remote attackers to inject arbitrary web script or HTML via the (1) cid, (2) message, or (3) question parameter. NOTE: some of these details are obtained from third party information.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2007-06-27T09:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.webmin.com/security.html", }, { name: "25785", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25785", }, { name: "ADV-2007-2117", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2007/2117", }, { name: "24381", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/24381", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.webmin.com/changes-1.350.html", }, { name: "GLSA-200707-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-200707-05.xml", }, { name: "25580", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25580", }, { name: "36932", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/36932", }, { name: "MDKSA-2007:135", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:135", }, { name: "25956", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25956", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2007-3156", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple cross-site scripting (XSS) vulnerabilities in pam_login.cgi in Webmin before 1.350 and Usermin before 1.280 allow remote attackers to inject arbitrary web script or HTML via the (1) cid, (2) message, or (3) question parameter. NOTE: some of these details are obtained from third party information.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.webmin.com/security.html", refsource: "CONFIRM", url: "http://www.webmin.com/security.html", }, { name: "25785", refsource: "SECUNIA", url: "http://secunia.com/advisories/25785", }, { name: "ADV-2007-2117", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2007/2117", }, { name: "24381", refsource: "BID", url: "http://www.securityfocus.com/bid/24381", }, { name: "http://www.webmin.com/changes-1.350.html", refsource: "CONFIRM", url: "http://www.webmin.com/changes-1.350.html", }, { name: "GLSA-200707-05", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-200707-05.xml", }, { name: "25580", refsource: "SECUNIA", url: "http://secunia.com/advisories/25580", }, { name: "36932", refsource: "OSVDB", url: "http://osvdb.org/36932", }, { name: "MDKSA-2007:135", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:135", }, { name: "25956", refsource: "SECUNIA", url: "http://secunia.com/advisories/25956", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2007-3156", datePublished: "2007-06-11T22:00:00", dateReserved: "2007-06-11T00:00:00", dateUpdated: "2024-08-07T14:05:29.294Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-41156
Vulnerability from cvelistv5
Published
2023-09-14 00:00
Modified
2024-09-25 19:33
Severity ?
EPSS score ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the filter and forward mail tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the save to new folder named field while creating a new filter.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:54:03.588Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://webmin.com/tags/webmin-changelog/", }, { tags: [ "x_transferred", ], url: "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41156", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-41156", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-25T19:32:59.314276Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-25T19:33:15.580Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "A Stored Cross-Site Scripting (XSS) vulnerability in the filter and forward mail tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the save to new folder named field while creating a new filter.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-14T20:46:17.664013", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://webmin.com/tags/webmin-changelog/", }, { url: "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41156", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-41156", datePublished: "2023-09-14T00:00:00", dateReserved: "2023-08-24T00:00:00", dateUpdated: "2024-09-25T19:33:15.580Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-35132
Vulnerability from cvelistv5
Published
2022-10-25 00:00
Modified
2024-08-03 09:29
Severity ?
EPSS score ?
Summary
Usermin through 1.850 allows a remote authenticated user to execute OS commands via command injection in a filename for the GPG module.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T09:29:17.314Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://github.com/ly1g3/webmin-usermin-vulnerabilities", }, { tags: [ "x_transferred", ], url: "https://webmin.com/uchanges.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Usermin through 1.850 allows a remote authenticated user to execute OS commands via command injection in a filename for the GPG module.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-10-25T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://github.com/ly1g3/webmin-usermin-vulnerabilities", }, { url: "https://webmin.com/uchanges.html", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2022-35132", datePublished: "2022-10-25T00:00:00", dateReserved: "2022-07-04T00:00:00", dateUpdated: "2024-08-03T09:29:17.314Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-41155
Vulnerability from cvelistv5
Published
2023-09-13 00:00
Modified
2024-09-25 20:39
Severity ?
EPSS score ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the mail forwarding and replies tab in Webmin and Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the forward to field while creating a mail forwarding rule.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:54:04.491Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://webmin.com/tags/webmin-changelog/", }, { tags: [ "x_transferred", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41155", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-41155", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-25T20:39:47.299305Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-25T20:39:56.424Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "A Stored Cross-Site Scripting (XSS) vulnerability in the mail forwarding and replies tab in Webmin and Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the forward to field while creating a mail forwarding rule.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-13T21:41:29.263678", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://webmin.com/tags/webmin-changelog/", }, { url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41155", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-41155", datePublished: "2023-09-13T00:00:00", dateReserved: "2023-08-24T00:00:00", dateUpdated: "2024-09-25T20:39:56.424Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2009-4568
Vulnerability from cvelistv5
Published
2010-01-05 18:31
Modified
2024-08-07 07:08
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Webmin before 1.500 and Usermin before 1.430 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.webmin.com/security.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/37259 | vdb-entry, x_refsource_BID | |
http://www.mandriva.com/security/advisories?name=MDVSA-2010:036 | vendor-advisory, x_refsource_MANDRIVA | |
http://secunia.com/advisories/37648 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2009/3457 | vdb-entry, x_refsource_VUPEN |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T07:08:38.108Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.webmin.com/security.html", }, { name: "37259", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/37259", }, { name: "MDVSA-2010:036", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:036", }, { name: "37648", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/37648", }, { name: "ADV-2009-3457", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2009/3457", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2009-12-09T00:00:00", descriptions: [ { lang: "en", value: "Cross-site scripting (XSS) vulnerability in Webmin before 1.500 and Usermin before 1.430 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2010-02-24T10:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.webmin.com/security.html", }, { name: "37259", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/37259", }, { name: "MDVSA-2010:036", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:036", }, { name: "37648", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/37648", }, { name: "ADV-2009-3457", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2009/3457", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2009-4568", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Cross-site scripting (XSS) vulnerability in Webmin before 1.500 and Usermin before 1.430 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.webmin.com/security.html", refsource: "CONFIRM", url: "http://www.webmin.com/security.html", }, { name: "37259", refsource: "BID", url: "http://www.securityfocus.com/bid/37259", }, { name: "MDVSA-2010:036", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:036", }, { name: "37648", refsource: "SECUNIA", url: "http://secunia.com/advisories/37648", }, { name: "ADV-2009-3457", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2009/3457", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2009-4568", datePublished: "2010-01-05T18:31:00", dateReserved: "2010-01-05T00:00:00", dateUpdated: "2024-08-07T07:08:38.108Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2023-09-14 21:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the filter and forward mail tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the save to new folder named field while creating a new filter.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:2.001:*:*:*:*:*:*:*", matchCriteriaId: "9CE9B3CB-9D26-492D-9584-317C5BE061EE", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A Stored Cross-Site Scripting (XSS) vulnerability in the filter and forward mail tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the save to new folder named field while creating a new filter.", }, { lang: "es", value: "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pestaña de filtro y reenvío de correo en Usermin 2.001 permite a atacantes remotos inyectar script web o HTML de su elección a través del campo llamado \"guardar en nueva carpeta\" mientras crean un nuevo filtro.", }, ], id: "CVE-2023-41156", lastModified: "2024-11-21T08:20:41.177", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-09-14T21:15:10.630", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41156", }, { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41156", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-09-16 06:15
Modified
2024-11-21 08:20
Severity ?
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the folder name parameter while creating the folder to manage the folder tab, filter tab, and forward mail tab.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*", matchCriteriaId: "ED13897E-B6FB-4976-9037-2136FDFE1A50", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the folder name parameter while creating the folder to manage the folder tab, filter tab, and forward mail tab.", }, { lang: "es", value: "Múltiples vulnerabilidades de Cross-Site Scripting (XSS) almacenado en Usermin 2.000 permiten a atacantes remotos inyectar scripts web o HTML arbitrarias a través del parámetro de \"nombre de carpeta\" mientras crean la carpeta para administrar la pestaña de carpeta, la pestaña de filtro y la pestaña de reenvío de correo.", }, ], id: "CVE-2023-41157", lastModified: "2024-11-21T08:20:41.337", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-09-16T06:15:07.627", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41157", }, { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41157", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2008-02-12 02:00
Modified
2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Webmin 1.370 and 1.390 and Usermin 1.300 and 1.320 allows remote attackers to inject arbitrary web script or HTML via the search parameter to webmin_search.cgi (aka the search section), and possibly other components accessed through a "search box" or "open file box." NOTE: some of these details are obtained from third party information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:1.3:*:*:*:*:*:*:*", matchCriteriaId: "74E28AB1-D60A-4CFC-9133-552B7AA12D8D", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.32:*:*:*:*:*:*:*", matchCriteriaId: "06EBBDAA-05C2-4CFD-AC36-A24E5A768B09", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.370:*:*:*:*:*:*:*", matchCriteriaId: "E948F223-D365-4D5B-9C2B-FB064F8DC00B", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.390:*:*:*:*:*:*:*", matchCriteriaId: "2B767E9C-D321-4972-BF7A-B5E62956D6CD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cross-site scripting (XSS) vulnerability in Webmin 1.370 and 1.390 and Usermin 1.300 and 1.320 allows remote attackers to inject arbitrary web script or HTML via the search parameter to webmin_search.cgi (aka the search section), and possibly other components accessed through a \"search box\" or \"open file box.\" NOTE: some of these details are obtained from third party information.", }, { lang: "es", value: "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Webmin 1.370 y 1.390 y Usermin 1.300 y 1.320. Permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro de búsqueda a webmin_search.cgi (también conocido como la sección de búsqueda) y posiblemente otros componentes accedidos a través de una \"caja de búsqueda\" o \"caja de archivo abierto\". NOTA: algunos de estos detalles se han obtenido de información de terceros.", }, ], id: "CVE-2008-0720", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2008-02-12T02:00:00.000", references: [ { source: "cve@mitre.org", url: "http://forum.aria-security.net/showthread.php?t=511", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/28827", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/archive/1/487656/100/0/threaded", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/archive/1/487678/100/0/threaded", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/27662", }, { source: "cve@mitre.org", url: "http://www.vupen.com/english/advisories/2008/0450", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://forum.aria-security.net/showthread.php?t=511", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/28827", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/487656/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/487678/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/27662", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2008/0450", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-04-12 22:59
Modified
2024-11-21 02:53
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi in Usermin before 1.690.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN32504719/index.html | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | http://www.securityfocus.com/bid/93477 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN32504719/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/93477 | Third Party Advisory, VDB Entry |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*", matchCriteriaId: "40B4E312-6082-49F1-9B40-A603221570A2", versionEndIncluding: "1.680", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple cross-site scripting (XSS) vulnerabilities in (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi in Usermin before 1.690.", }, { lang: "es", value: "Múltiples vulnerabilidades (XSS) en (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi en Usermin en versiones anteriores a 1.690.", }, ], id: "CVE-2016-4897", lastModified: "2024-11-21T02:53:12.063", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-04-12T22:59:00.600", references: [ { source: "vultures@jpcert.or.jp", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://jvn.jp/en/jp/JVN32504719/index.html", }, { source: "vultures@jpcert.or.jp", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html", }, { source: "vultures@jpcert.or.jp", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/93477", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://jvn.jp/en/jp/JVN32504719/index.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/93477", }, ], sourceIdentifier: "vultures@jpcert.or.jp", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-09-13 22:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the mail forwarding and replies tab in Webmin and Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the forward to field while creating a mail forwarding rule.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*", matchCriteriaId: "ED13897E-B6FB-4976-9037-2136FDFE1A50", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:2.000:*:*:*:*:*:*:*", matchCriteriaId: "32C6CF7F-1287-4AB2-B4C0-801AC1EC3CB5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A Stored Cross-Site Scripting (XSS) vulnerability in the mail forwarding and replies tab in Webmin and Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the forward to field while creating a mail forwarding rule.", }, { lang: "es", value: "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pestaña de reenvío de correo y respuestas en Webmin y Usermin 2.000 permite a atacantes remotos inyectar scripts web o HTML de su elección a través del campo reenviar a mientras crean una regla de reenvío de correo.", }, ], id: "CVE-2023-41155", lastModified: "2024-11-21T08:20:41.027", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-09-13T22:15:08.747", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41155", }, { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41155", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-06-21 15:55
Modified
2025-04-12 10:46
Severity ?
Summary
Usermin before 1.600 allows remote attackers to execute arbitrary operating-system commands via unspecified vectors related to a user action.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*", matchCriteriaId: "928167DF-5E72-4775-99C3-735068AFD05F", versionEndIncluding: "1.590", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.4:*:*:*:*:*:*:*", matchCriteriaId: "3046F962-BD9C-4E67-B2A8-9664440317A2", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.5:*:*:*:*:*:*:*", matchCriteriaId: "A83F4A87-03D8-461B-B64A-81E171C88119", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.6:*:*:*:*:*:*:*", matchCriteriaId: "E777B661-B6A5-4033-85BA-4B17A7FDF905", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.7:*:*:*:*:*:*:*", matchCriteriaId: "866EC157-2F84-4382-B081-AB7BF9D5B649", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.80:*:*:*:*:*:*:*", matchCriteriaId: "7F001647-DBB0-4B2A-AAF0-44DB043FB6DF", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.90:*:*:*:*:*:*:*", matchCriteriaId: "9A424E19-4946-4F66-8198-25380B073631", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.910:*:*:*:*:*:*:*", matchCriteriaId: "88950B52-9163-42CA-B693-E451C5EFF0AE", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.929:*:*:*:*:*:*:*", matchCriteriaId: "50397E8C-F4B4-48EA-9305-AEA7D946A222", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.930:*:*:*:*:*:*:*", matchCriteriaId: "9A6C9C87-DDA3-4F9F-BC5F-D23BBF866DCF", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.940:*:*:*:*:*:*:*", matchCriteriaId: "2F88DA6C-2018-4332-B8B9-2DE8C84AFF0C", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.950:*:*:*:*:*:*:*", matchCriteriaId: "1EFE6FC5-4B9D-4270-8847-4A8CD016B861", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.960:*:*:*:*:*:*:*", matchCriteriaId: "7AB5C8A8-3DC9-4DE7-9A69-E61F9BA481AE", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.970:*:*:*:*:*:*:*", matchCriteriaId: "51C3396E-17DD-4096-B165-62C95D9EB349", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.980:*:*:*:*:*:*:*", matchCriteriaId: "DFDF2AE3-69D9-4BAC-895A-2E916A8247DC", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.990:*:*:*:*:*:*:*", matchCriteriaId: "2AF11C33-F62D-4486-920C-9528E519107B", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.000:*:*:*:*:*:*:*", matchCriteriaId: "973363CE-6A66-4BAF-8C11-D9B4911BF9A8", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.010:*:*:*:*:*:*:*", matchCriteriaId: "20B5FDD4-AD31-4985-97E2-179C0F6A6525", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.020:*:*:*:*:*:*:*", matchCriteriaId: "0C3551D4-9B28-4A29-9C30-D91C5D81F195", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.030:*:*:*:*:*:*:*", matchCriteriaId: "8EEF1E3D-F633-4594-8E65-6AB0B941E95A", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.040:*:*:*:*:*:*:*", matchCriteriaId: "D32B0E0C-B72B-4F3D-ABAC-BBA5A6E242ED", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.050:*:*:*:*:*:*:*", matchCriteriaId: "66BDC46A-832F-4DE9-848E-898F99798D0E", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.051:*:*:*:*:*:*:*", matchCriteriaId: "70AC0911-928C-4087-9EA8-BF0CB25BDD56", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.060:*:*:*:*:*:*:*", matchCriteriaId: "35B34A95-A9D1-454D-AE3A-A68AE11A60AA", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.070:*:*:*:*:*:*:*", matchCriteriaId: "EDE9ABF8-331F-4268-8D2A-692BEC8F98DB", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.080:*:*:*:*:*:*:*", matchCriteriaId: "8BD93C56-DE08-4CAC-A345-7C40C2CB0598", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.090:*:*:*:*:*:*:*", matchCriteriaId: "F540CEF3-C21D-48E5-84AD-81CF7C62A948", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.100:*:*:*:*:*:*:*", matchCriteriaId: "E554657F-DF48-41F9-A2F6-4C311C2AC99A", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.110:*:*:*:*:*:*:*", matchCriteriaId: "CA039A97-F28A-4216-B909-79EEBD8A6FC6", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.120:*:*:*:*:*:*:*", matchCriteriaId: "75B0C24B-7A62-4157-8CA8-5FA800F67C33", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.130:*:*:*:*:*:*:*", matchCriteriaId: "F3652F8E-A163-4337-BAE0-210757FC421D", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.140:*:*:*:*:*:*:*", matchCriteriaId: "87E84FE0-ACF0-43D9-ACC2-D662D5488B8C", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.150:*:*:*:*:*:*:*", matchCriteriaId: "83419D0A-7C03-4F3E-9A95-25BA299D5961", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.160:*:*:*:*:*:*:*", matchCriteriaId: "77075C79-35BF-4841-8103-A372A67ECF45", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.170:*:*:*:*:*:*:*", matchCriteriaId: "6FDF692C-13F5-4E42-A5DF-2116080462F7", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.180:*:*:*:*:*:*:*", matchCriteriaId: "8D31D014-CB91-436C-A114-3C33D95E8D73", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.190:*:*:*:*:*:*:*", matchCriteriaId: "3FBA2FDA-D70D-4850-A7E7-4A3C25B0C1C1", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.200:*:*:*:*:*:*:*", matchCriteriaId: "1A4AC88F-C70C-4184-8605-5A4BC95D83DC", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.210:*:*:*:*:*:*:*", matchCriteriaId: "72D4AAAF-A284-4FD9-B011-C822ED2DBAC9", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.220:*:*:*:*:*:*:*", matchCriteriaId: "490DBC72-DADD-491E-AC18-4D4C178ABECD", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.230:*:*:*:*:*:*:*", matchCriteriaId: "A455B1DC-03F9-4338-9BD5-9184434F7AA4", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.240:*:*:*:*:*:*:*", matchCriteriaId: "36C87163-EBC2-47DC-9865-9455CF066DB1", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.250:*:*:*:*:*:*:*", matchCriteriaId: "EDBED527-4698-44DC-8DFE-E107702C2D9D", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.260:*:*:*:*:*:*:*", matchCriteriaId: "15CFE78E-22EB-47B1-9BD3-0A093645304A", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.270:*:*:*:*:*:*:*", matchCriteriaId: "D8CAB5C2-2F68-46F6-BF7D-12AEEB03BF66", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.280:*:*:*:*:*:*:*", matchCriteriaId: "A5E20E3B-AC6A-4059-9C49-9AF4FADDFF30", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.290:*:*:*:*:*:*:*", matchCriteriaId: "B0B775C5-8A6F-4D08-9776-709029E918D6", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.300:*:*:*:*:*:*:*", matchCriteriaId: "D0235C6D-7EC8-4D89-8AE5-04B5628EDB74", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.310:*:*:*:*:*:*:*", matchCriteriaId: "3686B12E-EE12-4FDF-98BE-C7D24ADD6C86", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.320:*:*:*:*:*:*:*", matchCriteriaId: "F0BED163-D9FF-45C9-90D5-1B167ADD423C", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.330:*:*:*:*:*:*:*", matchCriteriaId: "93488E00-C176-4C66-85D5-172F33E3DECD", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.340:*:*:*:*:*:*:*", matchCriteriaId: "3DF6456E-E2F2-4777-BACC-9422B759F7F3", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.350:*:*:*:*:*:*:*", matchCriteriaId: "793F6997-0CCB-4074-97E3-E343D8508A48", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.360:*:*:*:*:*:*:*", matchCriteriaId: "A957BD3B-6074-48CD-9A13-14125E0E5D07", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.370:*:*:*:*:*:*:*", matchCriteriaId: "4B6BB3FC-61B6-42DF-9229-99C16BA41720", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.380:*:*:*:*:*:*:*", matchCriteriaId: "EFCB8560-8CEF-4CC4-B7C7-275C86F1A03C", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.390:*:*:*:*:*:*:*", matchCriteriaId: "9DFC35F7-DB28-49AB-ADFE-1068C751D49C", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.400:*:*:*:*:*:*:*", matchCriteriaId: "4508D9EF-6917-40D9-9443-96AA96A924DE", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.410:*:*:*:*:*:*:*", matchCriteriaId: "6D741056-8345-4C59-BD22-546D01DE5F0A", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.420:*:*:*:*:*:*:*", matchCriteriaId: "0FCA449A-5DF9-418D-B6D9-F4A73DBC3C65", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.430:*:*:*:*:*:*:*", matchCriteriaId: "8E129FDD-A404-465E-9A04-00A2090F7EDD", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.440:*:*:*:*:*:*:*", matchCriteriaId: "1841FFC1-25BA-4301-9515-381DAFBBCF6F", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.450:*:*:*:*:*:*:*", matchCriteriaId: "5038DD1D-793B-4117-B59D-9E1B520A1C76", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.460:*:*:*:*:*:*:*", matchCriteriaId: "06E9E986-E4A7-4BFA-91D8-5E47D31F4EBD", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.470:*:*:*:*:*:*:*", matchCriteriaId: "80B1D2D5-315B-4432-A9E6-41E9ABB329A2", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.480:*:*:*:*:*:*:*", matchCriteriaId: "9810CFF4-6321-4016-9A10-A7C3D90CB000", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.490:*:*:*:*:*:*:*", matchCriteriaId: "2E26A472-555C-4081-8FBD-054761B4FE87", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.500:*:*:*:*:*:*:*", matchCriteriaId: "13519AED-F310-49BA-B0E2-F52F8233F6A6", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.510:*:*:*:*:*:*:*", matchCriteriaId: "125CF39D-EBBA-418B-A9DC-207E5A510A45", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.520:*:*:*:*:*:*:*", matchCriteriaId: "CE280A31-AC7F-4A48-8F71-F9C2AB8EC7EF", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.530:*:*:*:*:*:*:*", matchCriteriaId: "FFABB6DD-E9C7-424C-8938-61A6617E2E27", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.540:*:*:*:*:*:*:*", matchCriteriaId: "2DD1A23C-FB0C-4899-AC34-8BD0BC7E4038", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.550:*:*:*:*:*:*:*", matchCriteriaId: "7EE09F26-2068-4E74-8B9A-5E1A1F5EDD0F", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.560:*:*:*:*:*:*:*", matchCriteriaId: "9DBB07F9-A3EB-485C-9116-1885F673BB7C", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.570:*:*:*:*:*:*:*", matchCriteriaId: "E4146A93-C7E4-4A38-8E38-E051D4D54BDF", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.580:*:*:*:*:*:*:*", matchCriteriaId: "7EA40B6F-4D0C-44A6-854A-B4DBCCBFD8BA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Usermin before 1.600 allows remote attackers to execute arbitrary operating-system commands via unspecified vectors related to a user action.", }, { lang: "es", value: "Usermin anterior a 1.600 permite a atacantes remotos ejecutar comandos arbitrarios del sistema operativo a través de vectores no especificados relacionados con una acción del usuario.", }, ], id: "CVE-2014-3883", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-06-21T15:55:05.103", references: [ { source: "vultures@jpcert.or.jp", url: "http://jvn.jp/en/jp/JVN48805624/index.html", }, { source: "vultures@jpcert.or.jp", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057", }, { source: "vultures@jpcert.or.jp", url: "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://jvn.jp/en/jp/JVN48805624/index.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html", }, ], sourceIdentifier: "vultures@jpcert.or.jp", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-09-07 22:15
Modified
2024-11-21 08:20
Severity ?
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the key comment to different pages such as public key details, Export key, sign key, send to key server page, and fetch from key server page tab.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*", matchCriteriaId: "ED13897E-B6FB-4976-9037-2136FDFE1A50", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the key comment to different pages such as public key details, Export key, sign key, send to key server page, and fetch from key server page tab.", }, { lang: "es", value: "Múltiples vulnerabilidades de Cross-Site Scripting (XSS) almacenadas en Usermin 2.000 permite a atacantes remotos inyectar script web o HTML arbitrarios mediante a través del comentario de la clave a diferentes páginas, como detalles de la clave pública, Exportar clave, Firmar clave, Enviar a la página del servidor de claves y Obtener de la pestaña de la página del servidor de claves.", }, ], id: "CVE-2023-41161", lastModified: "2024-11-21T08:20:41.970", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-09-07T22:15:07.793", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41161", }, { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41161", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-10-25 17:15
Modified
2024-11-21 07:10
Severity ?
Summary
Usermin through 1.850 allows a remote authenticated user to execute OS commands via command injection in a filename for the GPG module.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/ly1g3/webmin-usermin-vulnerabilities | Exploit, Third Party Advisory | |
cve@mitre.org | https://webmin.com/uchanges.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/ly1g3/webmin-usermin-vulnerabilities | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://webmin.com/uchanges.html | Release Notes, Vendor Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*", matchCriteriaId: "24AEB62A-F2B3-442F-8FE7-B649173A0236", versionEndIncluding: "1.850", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Usermin through 1.850 allows a remote authenticated user to execute OS commands via command injection in a filename for the GPG module.", }, { lang: "es", value: "Usermin versiones hasta 1.850, permite a un usuario remoto autenticado ejecutar comandos del Sistema Operativo por medio de una inyección de comandos en un nombre de archivo del módulo GPG", }, ], id: "CVE-2022-35132", lastModified: "2024-11-21T07:10:47.803", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-10-25T17:15:53.727", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://github.com/ly1g3/webmin-usermin-vulnerabilities", }, { source: "cve@mitre.org", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://webmin.com/uchanges.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://github.com/ly1g3/webmin-usermin-vulnerabilities", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://webmin.com/uchanges.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-09-13 22:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the scheduled cron jobs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the value field parameter while creating a new environment variable.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*", matchCriteriaId: "ED13897E-B6FB-4976-9037-2136FDFE1A50", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A Stored Cross-Site Scripting (XSS) vulnerability in the scheduled cron jobs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the value field parameter while creating a new environment variable.", }, { lang: "es", value: "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pestaña de trabajos cron programados en Usermin 2.000 permite a atacantes remotos inyectar scripts web o HTML de su elección a través del parámetro de campo de valor mientras crean una nueva variable de entorno.", }, ], id: "CVE-2023-41154", lastModified: "2024-11-21T08:20:40.870", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-09-13T22:15:08.623", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41154", }, { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41154", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2007-06-11 22:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in pam_login.cgi in Webmin before 1.350 and Usermin before 1.280 allow remote attackers to inject arbitrary web script or HTML via the (1) cid, (2) message, or (3) question parameter. NOTE: some of these details are obtained from third party information.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*", matchCriteriaId: "DD9A726E-9D24-40A5-A82A-B7D1B4EE3677", versionEndIncluding: "1.280", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*", matchCriteriaId: "E60E962F-8A39-481D-B272-BEA4A2E02A99", versionEndIncluding: "1.340", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple cross-site scripting (XSS) vulnerabilities in pam_login.cgi in Webmin before 1.350 and Usermin before 1.280 allow remote attackers to inject arbitrary web script or HTML via the (1) cid, (2) message, or (3) question parameter. NOTE: some of these details are obtained from third party information.", }, { lang: "es", value: "Múltiples vulnerabilidades de tipo cross-site scripting (XSS) en el archivo pam_login.cgi en webmin versiones anteriores a 1.350 y Usermin versiones anteriores a 1.280, permiten a atacantes remotos inyectar script web o HTML arbitrario por medio del parámetro (1) cid, (2) message o (3) question. NOTA: algunos de estos datos son obtenidos a partir de la información de terceros.", }, ], id: "CVE-2007-3156", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2007-06-11T22:30:00.000", references: [ { source: "cve@mitre.org", url: "http://osvdb.org/36932", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/25580", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/25785", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/25956", }, { source: "cve@mitre.org", url: "http://security.gentoo.org/glsa/glsa-200707-05.xml", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:135", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/24381", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2007/2117", }, { source: "cve@mitre.org", url: "http://www.webmin.com/changes-1.350.html", }, { source: "cve@mitre.org", url: "http://www.webmin.com/security.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/36932", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/25580", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/25785", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/25956", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.gentoo.org/glsa/glsa-200707-05.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:135", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/24381", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2007/2117", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.webmin.com/changes-1.350.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.webmin.com/security.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-08-29 22:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via options for the host value while editing the host options.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:2.001:*:*:*:*:*:*:*", matchCriteriaId: "9CE9B3CB-9D26-492D-9584-317C5BE061EE", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via options for the host value while editing the host options.", }, ], id: "CVE-2023-41153", lastModified: "2024-11-21T08:20:40.710", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-08-29T22:15:09.217", references: [ { source: "cve@mitre.org", url: "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41153", }, { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41153", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-09-14 21:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability while editing the autoreply file page in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML by editing the forward file manually.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*", matchCriteriaId: "ED13897E-B6FB-4976-9037-2136FDFE1A50", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A Stored Cross-Site Scripting (XSS) vulnerability while editing the autoreply file page in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML by editing the forward file manually.", }, { lang: "es", value: "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado al editar la página del archivo de respuesta automática en Usermin 2.000 permite a atacantes remotos inyectar script web o HTML de su elección editando el archivo de reenvío manualmente.", }, ], id: "CVE-2023-41159", lastModified: "2024-11-21T08:20:41.660", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-09-14T21:15:10.690", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41159", }, { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41159", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-09-13 22:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the file mask field while searching under the tools drop down.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*", matchCriteriaId: "ED13897E-B6FB-4976-9037-2136FDFE1A50", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the file mask field while searching under the tools drop down.", }, { lang: "es", value: "Una vulnerabilidad de Cross-Site Scripting (XSS) Reflejada en la pestaña del administrador de archivos en Usermin 2.000 permite a atacantes remotos inyectar scripts web o HTML arbitrarias a través del campo de máscara de archivos mientras buscan en el menú desplegable de herramientas.", }, ], id: "CVE-2023-41162", lastModified: "2024-11-21T08:20:42.123", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-09-13T22:15:09.017", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41162", }, { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41162", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-07-20 11:12
Modified
2025-04-12 10:46
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Usermin before 1.600 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this might overlap CVE-2014-3924.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN92737498/index.html | Vendor Advisory | |
vultures@jpcert.or.jp | http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN92737498/index.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058 | Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*", matchCriteriaId: "928167DF-5E72-4775-99C3-735068AFD05F", versionEndIncluding: "1.590", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.4:*:*:*:*:*:*:*", matchCriteriaId: "3046F962-BD9C-4E67-B2A8-9664440317A2", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.5:*:*:*:*:*:*:*", matchCriteriaId: "A83F4A87-03D8-461B-B64A-81E171C88119", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.6:*:*:*:*:*:*:*", matchCriteriaId: "E777B661-B6A5-4033-85BA-4B17A7FDF905", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.7:*:*:*:*:*:*:*", matchCriteriaId: "866EC157-2F84-4382-B081-AB7BF9D5B649", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.80:*:*:*:*:*:*:*", matchCriteriaId: "7F001647-DBB0-4B2A-AAF0-44DB043FB6DF", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.90:*:*:*:*:*:*:*", matchCriteriaId: "9A424E19-4946-4F66-8198-25380B073631", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.910:*:*:*:*:*:*:*", matchCriteriaId: "88950B52-9163-42CA-B693-E451C5EFF0AE", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.929:*:*:*:*:*:*:*", matchCriteriaId: "50397E8C-F4B4-48EA-9305-AEA7D946A222", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.930:*:*:*:*:*:*:*", matchCriteriaId: "9A6C9C87-DDA3-4F9F-BC5F-D23BBF866DCF", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.940:*:*:*:*:*:*:*", matchCriteriaId: "2F88DA6C-2018-4332-B8B9-2DE8C84AFF0C", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.950:*:*:*:*:*:*:*", matchCriteriaId: "1EFE6FC5-4B9D-4270-8847-4A8CD016B861", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.960:*:*:*:*:*:*:*", matchCriteriaId: "7AB5C8A8-3DC9-4DE7-9A69-E61F9BA481AE", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.970:*:*:*:*:*:*:*", matchCriteriaId: "51C3396E-17DD-4096-B165-62C95D9EB349", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.980:*:*:*:*:*:*:*", matchCriteriaId: "DFDF2AE3-69D9-4BAC-895A-2E916A8247DC", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.990:*:*:*:*:*:*:*", matchCriteriaId: "2AF11C33-F62D-4486-920C-9528E519107B", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.000:*:*:*:*:*:*:*", matchCriteriaId: "973363CE-6A66-4BAF-8C11-D9B4911BF9A8", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.010:*:*:*:*:*:*:*", matchCriteriaId: "20B5FDD4-AD31-4985-97E2-179C0F6A6525", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.020:*:*:*:*:*:*:*", matchCriteriaId: "0C3551D4-9B28-4A29-9C30-D91C5D81F195", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.030:*:*:*:*:*:*:*", matchCriteriaId: "8EEF1E3D-F633-4594-8E65-6AB0B941E95A", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.040:*:*:*:*:*:*:*", matchCriteriaId: "D32B0E0C-B72B-4F3D-ABAC-BBA5A6E242ED", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.050:*:*:*:*:*:*:*", matchCriteriaId: "66BDC46A-832F-4DE9-848E-898F99798D0E", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.051:*:*:*:*:*:*:*", matchCriteriaId: "70AC0911-928C-4087-9EA8-BF0CB25BDD56", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.060:*:*:*:*:*:*:*", matchCriteriaId: "35B34A95-A9D1-454D-AE3A-A68AE11A60AA", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.070:*:*:*:*:*:*:*", matchCriteriaId: "EDE9ABF8-331F-4268-8D2A-692BEC8F98DB", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.080:*:*:*:*:*:*:*", matchCriteriaId: "8BD93C56-DE08-4CAC-A345-7C40C2CB0598", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.090:*:*:*:*:*:*:*", matchCriteriaId: "F540CEF3-C21D-48E5-84AD-81CF7C62A948", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.100:*:*:*:*:*:*:*", matchCriteriaId: "E554657F-DF48-41F9-A2F6-4C311C2AC99A", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.110:*:*:*:*:*:*:*", matchCriteriaId: "CA039A97-F28A-4216-B909-79EEBD8A6FC6", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.120:*:*:*:*:*:*:*", matchCriteriaId: "75B0C24B-7A62-4157-8CA8-5FA800F67C33", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.130:*:*:*:*:*:*:*", matchCriteriaId: "F3652F8E-A163-4337-BAE0-210757FC421D", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.140:*:*:*:*:*:*:*", matchCriteriaId: "87E84FE0-ACF0-43D9-ACC2-D662D5488B8C", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.150:*:*:*:*:*:*:*", matchCriteriaId: "83419D0A-7C03-4F3E-9A95-25BA299D5961", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.160:*:*:*:*:*:*:*", matchCriteriaId: "77075C79-35BF-4841-8103-A372A67ECF45", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.170:*:*:*:*:*:*:*", matchCriteriaId: "6FDF692C-13F5-4E42-A5DF-2116080462F7", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.180:*:*:*:*:*:*:*", matchCriteriaId: "8D31D014-CB91-436C-A114-3C33D95E8D73", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.190:*:*:*:*:*:*:*", matchCriteriaId: "3FBA2FDA-D70D-4850-A7E7-4A3C25B0C1C1", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.200:*:*:*:*:*:*:*", matchCriteriaId: "1A4AC88F-C70C-4184-8605-5A4BC95D83DC", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.210:*:*:*:*:*:*:*", matchCriteriaId: "72D4AAAF-A284-4FD9-B011-C822ED2DBAC9", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.220:*:*:*:*:*:*:*", matchCriteriaId: "490DBC72-DADD-491E-AC18-4D4C178ABECD", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.230:*:*:*:*:*:*:*", matchCriteriaId: "A455B1DC-03F9-4338-9BD5-9184434F7AA4", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.240:*:*:*:*:*:*:*", matchCriteriaId: "36C87163-EBC2-47DC-9865-9455CF066DB1", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.250:*:*:*:*:*:*:*", matchCriteriaId: "EDBED527-4698-44DC-8DFE-E107702C2D9D", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.260:*:*:*:*:*:*:*", matchCriteriaId: "15CFE78E-22EB-47B1-9BD3-0A093645304A", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.270:*:*:*:*:*:*:*", matchCriteriaId: "D8CAB5C2-2F68-46F6-BF7D-12AEEB03BF66", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.280:*:*:*:*:*:*:*", matchCriteriaId: "A5E20E3B-AC6A-4059-9C49-9AF4FADDFF30", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.290:*:*:*:*:*:*:*", matchCriteriaId: "B0B775C5-8A6F-4D08-9776-709029E918D6", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.300:*:*:*:*:*:*:*", matchCriteriaId: "D0235C6D-7EC8-4D89-8AE5-04B5628EDB74", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.310:*:*:*:*:*:*:*", matchCriteriaId: "3686B12E-EE12-4FDF-98BE-C7D24ADD6C86", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.320:*:*:*:*:*:*:*", matchCriteriaId: "F0BED163-D9FF-45C9-90D5-1B167ADD423C", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.330:*:*:*:*:*:*:*", matchCriteriaId: "93488E00-C176-4C66-85D5-172F33E3DECD", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.340:*:*:*:*:*:*:*", matchCriteriaId: "3DF6456E-E2F2-4777-BACC-9422B759F7F3", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.350:*:*:*:*:*:*:*", matchCriteriaId: "793F6997-0CCB-4074-97E3-E343D8508A48", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.360:*:*:*:*:*:*:*", matchCriteriaId: "A957BD3B-6074-48CD-9A13-14125E0E5D07", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.370:*:*:*:*:*:*:*", matchCriteriaId: "4B6BB3FC-61B6-42DF-9229-99C16BA41720", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.380:*:*:*:*:*:*:*", matchCriteriaId: "EFCB8560-8CEF-4CC4-B7C7-275C86F1A03C", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.390:*:*:*:*:*:*:*", matchCriteriaId: "9DFC35F7-DB28-49AB-ADFE-1068C751D49C", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.400:*:*:*:*:*:*:*", matchCriteriaId: "4508D9EF-6917-40D9-9443-96AA96A924DE", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.410:*:*:*:*:*:*:*", matchCriteriaId: "6D741056-8345-4C59-BD22-546D01DE5F0A", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.420:*:*:*:*:*:*:*", matchCriteriaId: "0FCA449A-5DF9-418D-B6D9-F4A73DBC3C65", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.430:*:*:*:*:*:*:*", matchCriteriaId: "8E129FDD-A404-465E-9A04-00A2090F7EDD", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.440:*:*:*:*:*:*:*", matchCriteriaId: "1841FFC1-25BA-4301-9515-381DAFBBCF6F", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.450:*:*:*:*:*:*:*", matchCriteriaId: "5038DD1D-793B-4117-B59D-9E1B520A1C76", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.460:*:*:*:*:*:*:*", matchCriteriaId: "06E9E986-E4A7-4BFA-91D8-5E47D31F4EBD", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.470:*:*:*:*:*:*:*", matchCriteriaId: "80B1D2D5-315B-4432-A9E6-41E9ABB329A2", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.480:*:*:*:*:*:*:*", matchCriteriaId: "9810CFF4-6321-4016-9A10-A7C3D90CB000", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.490:*:*:*:*:*:*:*", matchCriteriaId: "2E26A472-555C-4081-8FBD-054761B4FE87", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.500:*:*:*:*:*:*:*", matchCriteriaId: "13519AED-F310-49BA-B0E2-F52F8233F6A6", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.510:*:*:*:*:*:*:*", matchCriteriaId: "125CF39D-EBBA-418B-A9DC-207E5A510A45", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.520:*:*:*:*:*:*:*", matchCriteriaId: "CE280A31-AC7F-4A48-8F71-F9C2AB8EC7EF", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.530:*:*:*:*:*:*:*", matchCriteriaId: "FFABB6DD-E9C7-424C-8938-61A6617E2E27", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.540:*:*:*:*:*:*:*", matchCriteriaId: "2DD1A23C-FB0C-4899-AC34-8BD0BC7E4038", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.550:*:*:*:*:*:*:*", matchCriteriaId: "7EE09F26-2068-4E74-8B9A-5E1A1F5EDD0F", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.560:*:*:*:*:*:*:*", matchCriteriaId: "9DBB07F9-A3EB-485C-9116-1885F673BB7C", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.570:*:*:*:*:*:*:*", matchCriteriaId: "E4146A93-C7E4-4A38-8E38-E051D4D54BDF", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.580:*:*:*:*:*:*:*", matchCriteriaId: "7EA40B6F-4D0C-44A6-854A-B4DBCCBFD8BA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cross-site scripting (XSS) vulnerability in Usermin before 1.600 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this might overlap CVE-2014-3924.", }, { lang: "es", value: "Vulnerabilidad de XSS en Usermin anterior a 1.600 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de vectores no especificados. NOTA: esto podría solarse con CVE-2014-3924.", }, ], id: "CVE-2014-3884", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2014-07-20T11:12:50.433", references: [ { source: "vultures@jpcert.or.jp", tags: [ "Vendor Advisory", ], url: "http://jvn.jp/en/jp/JVN92737498/index.html", }, { source: "vultures@jpcert.or.jp", tags: [ "Vendor Advisory", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://jvn.jp/en/jp/JVN92737498/index.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058", }, ], sourceIdentifier: "vultures@jpcert.or.jp", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-07-27 04:15
Modified
2024-11-21 07:13
Severity ?
Summary
The Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.webmin.com/security.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.webmin.com/security.html | Vendor Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*", matchCriteriaId: "24AEB62A-F2B3-442F-8FE7-B649173A0236", versionEndIncluding: "1.850", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.995:*:*:*:*:*:*:*", matchCriteriaId: "720EE395-A946-4F86-892D-EFB3D3A4A0AB", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message.", }, { lang: "es", value: "El módulo Read Mail de Webmin 1.995 y Usermin hasta 1.850 permite un ataque de tipo XSS por medio de un mensaje de correo electrónico HTML diseñado", }, ], id: "CVE-2022-36880", lastModified: "2024-11-21T07:13:58.237", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-07-27T04:15:10.837", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://www.webmin.com/security.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.webmin.com/security.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-09-14 21:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the key name field while adding an authorized key.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41160 | Exploit, Third Party Advisory | |
cve@mitre.org | https://webmin.com/tags/webmin-changelog/ | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41160 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://webmin.com/tags/webmin-changelog/ | Release Notes |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:2.001:*:*:*:*:*:*:*", matchCriteriaId: "9CE9B3CB-9D26-492D-9584-317C5BE061EE", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the key name field while adding an authorized key.", }, { lang: "es", value: "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pestaña de configuración SSH en Usermin 2.001 permite a los atacantes remotos inyectar scripts web arbitrarios o HTML a través del campo de nombre de clave mientras agregan una clave autorizada.", }, ], id: "CVE-2023-41160", lastModified: "2024-11-21T08:20:41.823", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-09-14T21:15:10.750", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41160", }, { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41160", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-09-13 22:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the description field while creating a new MIME type program.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*", matchCriteriaId: "ED13897E-B6FB-4976-9037-2136FDFE1A50", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the description field while creating a new MIME type program.", }, { lang: "es", value: "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pestaña de programas de tipo MIME en Usermin 2.000 permite a atacantes remotos inyectar scripts web o HTML de su elección a través del campo de descripción mientras crean un nuevo programa de tipo MIME.", }, ], id: "CVE-2023-41158", lastModified: "2024-11-21T08:20:41.503", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-09-13T22:15:08.887", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41158", }, { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41158", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2010-01-05 19:00
Modified
2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Webmin before 1.500 and Usermin before 1.430 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*", matchCriteriaId: "F3175C6B-A8BC-478B-A86B-D67DF656777C", versionEndIncluding: "1.32", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.4:*:*:*:*:*:*:*", matchCriteriaId: "3046F962-BD9C-4E67-B2A8-9664440317A2", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.5:*:*:*:*:*:*:*", matchCriteriaId: "A83F4A87-03D8-461B-B64A-81E171C88119", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.6:*:*:*:*:*:*:*", matchCriteriaId: "E777B661-B6A5-4033-85BA-4B17A7FDF905", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.7:*:*:*:*:*:*:*", matchCriteriaId: "866EC157-2F84-4382-B081-AB7BF9D5B649", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.8:*:*:*:*:*:*:*", matchCriteriaId: "E4DB1944-7DD9-480E-9479-69DC284F8A1F", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.9:*:*:*:*:*:*:*", matchCriteriaId: "842A041C-7252-49BF-AF8C-57CD61D875C5", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.91:*:*:*:*:*:*:*", matchCriteriaId: "BACD9446-5C6C-486F-AA95-C89435BD24B5", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.92:*:*:*:*:*:*:*", matchCriteriaId: "DBF2E55D-D1A5-4CB0-99AB-3FBAA16E79B6", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.93:*:*:*:*:*:*:*", matchCriteriaId: "D1EA5D74-C150-479E-8A8B-4E1251A04895", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.94:*:*:*:*:*:*:*", matchCriteriaId: "5783CE2F-D0AD-4871-BD4E-31DE40887F56", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.95:*:*:*:*:*:*:*", matchCriteriaId: "94611B8F-EFD0-47DD-8F96-37A74FFA7E00", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.96:*:*:*:*:*:*:*", matchCriteriaId: "A8AB5C49-4D3E-4A71-82CC-6866D7113671", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.97:*:*:*:*:*:*:*", matchCriteriaId: "A9F3973E-03E5-416F-9B88-61CDB51B9E3A", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.98:*:*:*:*:*:*:*", matchCriteriaId: "560E8A6D-93B8-4252-ACE2-7BA9AE97A97F", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:0.99:*:*:*:*:*:*:*", matchCriteriaId: "3A282895-E367-4445-84B9-07BF204B5100", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.000:*:*:*:*:*:*:*", matchCriteriaId: "973363CE-6A66-4BAF-8C11-D9B4911BF9A8", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.3:*:*:*:*:*:*:*", matchCriteriaId: "74E28AB1-D60A-4CFC-9133-552B7AA12D8D", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.010:*:*:*:*:*:*:*", matchCriteriaId: "20B5FDD4-AD31-4985-97E2-179C0F6A6525", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.020:*:*:*:*:*:*:*", matchCriteriaId: "0C3551D4-9B28-4A29-9C30-D91C5D81F195", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.030:*:*:*:*:*:*:*", matchCriteriaId: "8EEF1E3D-F633-4594-8E65-6AB0B941E95A", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.040:*:*:*:*:*:*:*", matchCriteriaId: "D32B0E0C-B72B-4F3D-ABAC-BBA5A6E242ED", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.051:*:*:*:*:*:*:*", matchCriteriaId: "70AC0911-928C-4087-9EA8-BF0CB25BDD56", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.060:*:*:*:*:*:*:*", matchCriteriaId: "35B34A95-A9D1-454D-AE3A-A68AE11A60AA", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.070:*:*:*:*:*:*:*", matchCriteriaId: "EDE9ABF8-331F-4268-8D2A-692BEC8F98DB", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.080:*:*:*:*:*:*:*", matchCriteriaId: "8BD93C56-DE08-4CAC-A345-7C40C2CB0598", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.090:*:*:*:*:*:*:*", matchCriteriaId: "F540CEF3-C21D-48E5-84AD-81CF7C62A948", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.100:*:*:*:*:*:*:*", matchCriteriaId: "E554657F-DF48-41F9-A2F6-4C311C2AC99A", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.110:*:*:*:*:*:*:*", matchCriteriaId: "CA039A97-F28A-4216-B909-79EEBD8A6FC6", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.120:*:*:*:*:*:*:*", matchCriteriaId: "75B0C24B-7A62-4157-8CA8-5FA800F67C33", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.130:*:*:*:*:*:*:*", matchCriteriaId: "F3652F8E-A163-4337-BAE0-210757FC421D", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.140:*:*:*:*:*:*:*", matchCriteriaId: "87E84FE0-ACF0-43D9-ACC2-D662D5488B8C", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.150:*:*:*:*:*:*:*", matchCriteriaId: "83419D0A-7C03-4F3E-9A95-25BA299D5961", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.210:*:*:*:*:*:*:*", matchCriteriaId: "72D4AAAF-A284-4FD9-B011-C822ED2DBAC9", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.220:*:*:*:*:*:*:*", matchCriteriaId: "490DBC72-DADD-491E-AC18-4D4C178ABECD", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.230:*:*:*:*:*:*:*", matchCriteriaId: "A455B1DC-03F9-4338-9BD5-9184434F7AA4", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.240:*:*:*:*:*:*:*", matchCriteriaId: "36C87163-EBC2-47DC-9865-9455CF066DB1", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.250:*:*:*:*:*:*:*", matchCriteriaId: "EDBED527-4698-44DC-8DFE-E107702C2D9D", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.260:*:*:*:*:*:*:*", matchCriteriaId: "15CFE78E-22EB-47B1-9BD3-0A093645304A", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.270:*:*:*:*:*:*:*", matchCriteriaId: "D8CAB5C2-2F68-46F6-BF7D-12AEEB03BF66", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:usermin:1.280:*:*:*:*:*:*:*", matchCriteriaId: "A5E20E3B-AC6A-4059-9C49-9AF4FADDFF30", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*", matchCriteriaId: "E7664DA2-5AC8-4A10-A7E9-4EA9AF5ABAEF", versionEndIncluding: "1.390", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.1:*:*:*:*:*:*:*", matchCriteriaId: "30E3CF12-D0B7-4C7F-96C8-36A3FAFA8EDF", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.2:*:*:*:*:*:*:*", matchCriteriaId: "C808C470-F0A1-4338-A988-3968EABE78E0", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.3:*:*:*:*:*:*:*", matchCriteriaId: "C16685C0-94E9-4AE6-8221-1D32112808F6", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.4:*:*:*:*:*:*:*", matchCriteriaId: "EDACA626-1687-4192-A2E8-C74823B715A5", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.5:*:*:*:*:*:*:*", matchCriteriaId: "A9641C23-B30A-4CB2-A348-BD708F68F90A", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.6:*:*:*:*:*:*:*", matchCriteriaId: "0852A462-22ED-422D-A454-0A6E026D9AD0", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.7:*:*:*:*:*:*:*", matchCriteriaId: "97FEF73D-767D-4BF2-AA12-67268719A404", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.21:*:*:*:*:*:*:*", matchCriteriaId: "84B5A02C-96AB-46FD-A958-86AC0DFD1F2A", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.22:*:*:*:*:*:*:*", matchCriteriaId: "BB1B8073-C512-4ACA-8E3F-92D46D63FBCF", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.31:*:*:*:*:*:*:*", matchCriteriaId: "B368FAD0-39A7-4115-9327-1D32BECF2F7E", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.41:*:*:*:*:*:*:*", matchCriteriaId: "2B3D7B7A-0426-4176-A759-E96024DC492D", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.42:*:*:*:*:*:*:*", matchCriteriaId: "1E3EFDEE-A99B-4D0E-B6A7-E7C285A5DFBC", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.51:*:*:*:*:*:*:*", matchCriteriaId: "50C3D4D4-246A-4287-AA42-CFDD0C1AE22A", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.76:*:*:*:*:*:*:*", matchCriteriaId: "F05CF0BA-0606-42E5-A631-D302FF1D59F0", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.77:*:*:*:*:*:*:*", matchCriteriaId: "6A79B7B3-708A-42E4-B4EF-7746F6292DB5", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.78:*:*:*:*:*:*:*", matchCriteriaId: "E2F06BC0-0418-4A1C-BD4A-B7429A6CEA39", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.79:*:*:*:*:*:*:*", matchCriteriaId: "1817FDA9-31F4-4D4A-A867-386D2F1CDB1C", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.80:*:*:*:*:*:*:*", matchCriteriaId: "23522A64-FD03-4C5B-9A8A-5E7CDDC65CEE", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.83:*:*:*:*:*:*:*", matchCriteriaId: "DFD94AA9-CABA-4FC8-8367-D5D9D8B4F623", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.84:*:*:*:*:*:*:*", matchCriteriaId: "35B136CA-47BF-46DE-885A-9E74EBDE5306", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.85:*:*:*:*:*:*:*", matchCriteriaId: "E9A3F522-6E6D-446C-8694-7AE91F19F1C7", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.88:*:*:*:*:*:*:*", matchCriteriaId: "DBB86BC7-4A99-4C5B-9460-CDDA7C4E4041", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.90:*:*:*:*:*:*:*", matchCriteriaId: "957C7CA1-DD36-409C-B7E5-01B719B4695E", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.91:*:*:*:*:*:*:*", matchCriteriaId: "0B0813F3-1886-481E-8822-4BD199C4934F", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.92:*:*:*:*:*:*:*", matchCriteriaId: "6D25A7CA-ED9D-4562-8965-D4906D1BE5FA", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.92.1:*:*:*:*:*:*:*", matchCriteriaId: "C5C38C77-246F-41A9-A3D5-99C2DDA1DAE1", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.93:*:*:*:*:*:*:*", matchCriteriaId: "C1F2D028-F2F9-4CE0-A24B-7DB44D488D4E", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.94:*:*:*:*:*:*:*", matchCriteriaId: "82EE7A9B-5688-4933-95B9-476873D44A65", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.95:*:*:*:*:*:*:*", matchCriteriaId: "30A57D7A-B989-4D82-B667-029A245AA6D5", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.96:*:*:*:*:*:*:*", matchCriteriaId: "C664186B-DD40-490B-B2DE-4279B00102F2", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.97:*:*:*:*:*:*:*", matchCriteriaId: "88E1D6C5-20FE-4514-B618-312BB19E5F6C", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.98:*:*:*:*:*:*:*", matchCriteriaId: "B5017EA5-7188-4293-9FDF-5D23DCB40B12", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.99:*:*:*:*:*:*:*", matchCriteriaId: "FF6C5F07-330D-46C5-8A8B-8DF734F4640F", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.950:*:*:*:*:*:*:*", matchCriteriaId: "08068E84-9EE5-4742-B70A-567CD4199604", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.960:*:*:*:*:*:*:*", matchCriteriaId: "5C6D5F6A-B34F-4134-959F-C31FC84EBCF9", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.970:*:*:*:*:*:*:*", matchCriteriaId: "DB4FEC51-DD03-418D-8E55-CEE696BE2D74", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.980:*:*:*:*:*:*:*", matchCriteriaId: "4B9F8F43-F9EC-4BC0-BDF6-EC3EDF5A71F4", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:0.990:*:*:*:*:*:*:*", matchCriteriaId: "DB6865E9-F244-4019-AA4C-3DB1655A6AA0", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.0.10:*:*:*:*:*:*:*", matchCriteriaId: "C644D728-1DD4-48E0-9E42-35E836006F41", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.0.20:*:*:*:*:*:*:*", matchCriteriaId: "D9425C1F-5E6A-489A-9A8B-9156E79FEAA5", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.0.30:*:*:*:*:*:*:*", matchCriteriaId: "8B8347DA-13F8-40E9-B9EA-2703C049AFA8", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.0.40:*:*:*:*:*:*:*", matchCriteriaId: "BD9C3443-526E-4D68-9C7E-F3432BECE6C0", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.0.50:*:*:*:*:*:*:*", matchCriteriaId: "C968FBE9-191A-40B1-9A69-BF24511E40B3", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.0.51:*:*:*:*:*:*:*", matchCriteriaId: "FC77E1B6-E368-4ECD-8459-69C718CE5409", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.0.60:*:*:*:*:*:*:*", matchCriteriaId: "D89047FD-39F0-4614-B1EC-D13BAF57405E", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.0.70:*:*:*:*:*:*:*", matchCriteriaId: "6CDF2120-F341-4C2E-88C1-A6C76626BFF0", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.0.80:*:*:*:*:*:*:*", matchCriteriaId: "01DFC15C-3513-4E94-B46D-94FEA0D627FE", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.0.90:*:*:*:*:*:*:*", matchCriteriaId: "F4E068D3-F6B5-4102-B9FA-949E2FAA33D1", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.1.00:*:*:*:*:*:*:*", matchCriteriaId: "7E6BD551-EC6A-4C77-B9E7-B9CF3DC21021", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.1.10:*:*:*:*:*:*:*", matchCriteriaId: "01B0FE2D-02BC-4081-B172-64A74389C5F5", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.1.20:*:*:*:*:*:*:*", matchCriteriaId: "43433ECE-8225-43EE-9F5E-FBB170B60CFD", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.1.21:*:*:*:*:*:*:*", matchCriteriaId: "1615ACA2-32CC-48B7-AB5A-0BB0FDA7F190", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.1.30:*:*:*:*:*:*:*", matchCriteriaId: "F5ABAE43-0EEF-44D5-AB36-44DA54290122", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.1.40:*:*:*:*:*:*:*", matchCriteriaId: "AD33CE40-DFC9-4BDC-BF4F-9E0B268B8503", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.1.50:*:*:*:*:*:*:*", matchCriteriaId: "8608F5A2-B6FA-43C6-9862-43DBAF01EB1C", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.1.60:*:*:*:*:*:*:*", matchCriteriaId: "53663534-8617-47D7-B4B7-A6C0D6168E86", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.2.20:*:*:*:*:*:*:*", matchCriteriaId: "E815171B-B054-450F-A9B3-2D522161DD02", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.2.30:*:*:*:*:*:*:*", matchCriteriaId: "CD941A62-A41E-41CB-80C0-8B780AC39FB1", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.2.40:*:*:*:*:*:*:*", matchCriteriaId: "786287DD-2565-4931-BBA0-2CACD7671352", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.2.50:*:*:*:*:*:*:*", matchCriteriaId: "4784DC04-D2C5-46C6-831F-23D69B4B0513", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.2.60:*:*:*:*:*:*:*", matchCriteriaId: "9C219DAB-C13C-4232-8B98-2D7A9ED16E30", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.2.70:*:*:*:*:*:*:*", matchCriteriaId: "F88507A8-6143-4FB7-8027-EFB0C981ED8A", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.2.80:*:*:*:*:*:*:*", matchCriteriaId: "E35C0772-8265-415F-A390-530640DB9599", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.2.90:*:*:*:*:*:*:*", matchCriteriaId: "BFA35DAA-1DC2-41D2-ADC7-F922FA658CAE", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.3.20:*:*:*:*:*:*:*", matchCriteriaId: "4C02919F-4201-4D1E-8395-04C6A7193077", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.3.30:*:*:*:*:*:*:*", matchCriteriaId: "727B060B-7600-4AD4-B66E-1A559B6EDA2D", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.335:*:*:*:*:*:*:*", matchCriteriaId: "7E3FF2E4-F2EF-43E7-911A-7744C4206216", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.336:*:*:*:*:*:*:*", matchCriteriaId: "09557B9C-3813-4466-995C-9FE3DC86B284", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.337:*:*:*:*:*:*:*", matchCriteriaId: "215FE3BC-30AB-40DD-A9F9-13E8F1F25CC2", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.340:*:*:*:*:*:*:*", matchCriteriaId: "85A8F9EA-7A8D-4BA9-9732-DE93388800A3", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.343:*:*:*:*:*:*:*", matchCriteriaId: "4272E132-D632-4E88-BB68-BBA15FA68546", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.360:*:*:*:*:*:*:*", matchCriteriaId: "080FCFDE-557E-4D35-8701-96AC28381ADF", vulnerable: true, }, { criteria: "cpe:2.3:a:webmin:webmin:1.370:*:*:*:*:*:*:*", matchCriteriaId: "E948F223-D365-4D5B-9C2B-FB064F8DC00B", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cross-site scripting (XSS) vulnerability in Webmin before 1.500 and Usermin before 1.430 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.", }, { lang: "es", value: "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Webmin anterior a 1.500 y Usermin anterior a 1.430, permite a atacantes remotos inyectar secuencias de comandos Web o HTML de su elección a través de vectores no especificados.", }, ], id: "CVE-2009-4568", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2010-01-05T19:00:00.340", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/37648", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:036", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/37259", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2009/3457", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.webmin.com/security.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/37648", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:036", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/37259", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2009/3457", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.webmin.com/security.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-09-13 22:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the handle program field while creating a new MIME type program.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*", matchCriteriaId: "ED13897E-B6FB-4976-9037-2136FDFE1A50", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the handle program field while creating a new MIME type program.", }, { lang: "es", value: "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pestaña de programas de tipo MIME en Usermin 2.000 permite a atacantes remotos inyectar scripts web o HTML arbitrarias a través del campo de programa de manejo mientras crean un nuevo programa de tipo MIME.", }, ], id: "CVE-2023-41152", lastModified: "2024-11-21T08:20:40.553", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-09-13T22:15:08.490", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41152", }, { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41152", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://webmin.com/tags/webmin-changelog/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }