gsd-2005-3042
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2005-3042",
    "description": "miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when \"full PAM conversations\" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).",
    "id": "GSD-2005-3042",
    "references": [
      "https://www.suse.com/security/cve/CVE-2005-3042.html"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2005-3042"
      ],
      "details": "miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when \"full PAM conversations\" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).",
      "id": "GSD-2005-3042",
      "modified": "2023-12-13T01:20:12.578585Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@mitre.org",
        "ID": "CVE-2005-3042",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when \"full PAM conversations\" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return)."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "16858",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/16858"
          },
          {
            "name": "17282",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/17282"
          },
          {
            "name": "GLSA-200509-17",
            "refsource": "GENTOO",
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200509-17.xml"
          },
          {
            "name": "19575",
            "refsource": "OSVDB",
            "url": "http://www.osvdb.org/19575"
          },
          {
            "name": "17",
            "refsource": "SREASON",
            "url": "http://securityreason.com/securityalert/17"
          },
          {
            "name": "14889",
            "refsource": "BID",
            "url": "http://www.securityfocus.com/bid/14889"
          },
          {
            "name": "ADV-2005-1791",
            "refsource": "VUPEN",
            "url": "http://www.vupen.com/english/advisories/2005/1791"
          },
          {
            "name": "http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html",
            "refsource": "MISC",
            "url": "http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html"
          },
          {
            "name": "MDKSA-2005:176",
            "refsource": "MANDRIVA",
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:176"
          },
          {
            "name": "SUSE-SR:2005:024",
            "refsource": "SUSE",
            "url": "http://www.novell.com/linux/security/advisories/2005_24_sr.html"
          },
          {
            "name": "20050921 [SNS Advisory No.83] Webmin/Usermin PAM Authentication Bypass Vulnerability",
            "refsource": "BUGTRAQ",
            "url": "http://archives.neohapsis.com/archives/bugtraq/2005-09/0257.html"
          },
          {
            "name": "http://www.webmin.com/changes-1.230.html",
            "refsource": "CONFIRM",
            "url": "http://www.webmin.com/changes-1.230.html"
          },
          {
            "name": "JVN#40940493",
            "refsource": "JVN",
            "url": "http://jvn.jp/jp/JVN%2340940493/index.html"
          },
          {
            "name": "http://www.webmin.com/uchanges-1.160.html",
            "refsource": "CONFIRM",
            "url": "http://www.webmin.com/uchanges-1.160.html"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:webmin:webmin:1.2.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:usermin:usermin:1.150:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3042"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when \"full PAM conversations\" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "NVD-CWE-Other"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20050921 [SNS Advisory No.83] Webmin/Usermin PAM Authentication Bypass Vulnerability",
              "refsource": "BUGTRAQ",
              "tags": [
                "Patch",
                "Vendor Advisory"
              ],
              "url": "http://archives.neohapsis.com/archives/bugtraq/2005-09/0257.html"
            },
            {
              "name": "http://www.webmin.com/changes-1.230.html",
              "refsource": "CONFIRM",
              "tags": [
                "Patch"
              ],
              "url": "http://www.webmin.com/changes-1.230.html"
            },
            {
              "name": "http://www.webmin.com/uchanges-1.160.html",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://www.webmin.com/uchanges-1.160.html"
            },
            {
              "name": "http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html",
              "refsource": "MISC",
              "tags": [
                "Patch",
                "Vendor Advisory"
              ],
              "url": "http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html"
            },
            {
              "name": "JVN#40940493",
              "refsource": "JVN",
              "tags": [],
              "url": "http://jvn.jp/jp/JVN%2340940493/index.html"
            },
            {
              "name": "19575",
              "refsource": "OSVDB",
              "tags": [],
              "url": "http://www.osvdb.org/19575"
            },
            {
              "name": "16858",
              "refsource": "SECUNIA",
              "tags": [
                "Patch",
                "Vendor Advisory"
              ],
              "url": "http://secunia.com/advisories/16858"
            },
            {
              "name": "GLSA-200509-17",
              "refsource": "GENTOO",
              "tags": [],
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200509-17.xml"
            },
            {
              "name": "MDKSA-2005:176",
              "refsource": "MANDRIVA",
              "tags": [],
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:176"
            },
            {
              "name": "SUSE-SR:2005:024",
              "refsource": "SUSE",
              "tags": [],
              "url": "http://www.novell.com/linux/security/advisories/2005_24_sr.html"
            },
            {
              "name": "17282",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/17282"
            },
            {
              "name": "14889",
              "refsource": "BID",
              "tags": [],
              "url": "http://www.securityfocus.com/bid/14889"
            },
            {
              "name": "17",
              "refsource": "SREASON",
              "tags": [],
              "url": "http://securityreason.com/securityalert/17"
            },
            {
              "name": "ADV-2005-1791",
              "refsource": "VUPEN",
              "tags": [],
              "url": "http://www.vupen.com/english/advisories/2005/1791"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "exploitabilityScore": 10.0,
          "impactScore": 6.4,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": true,
          "obtainUserPrivilege": false,
          "severity": "HIGH",
          "userInteractionRequired": false
        }
      },
      "lastModifiedDate": "2011-03-08T02:25Z",
      "publishedDate": "2005-09-22T10:03Z"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...