Webmin Multiple Input Validation Vulnerabilities
The vulnerabilities are reported in version 1.580. Other versions may also be affected.
An authenticated attacker may be able to execute arbitrary commands.
Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to disclose certain sensitive information.
1) Input passed via monitor type name is not properly sanitised in edit_mon.cgi and save_mon.cgi. This can be exploited to inject and execute arbitrary Perl code.
2) Input passed via the path info to show.cgi is not properly sanitised before being used in a "open()" function call. This can be exploited to inject and execute arbitrary shell commands.
3) Input passed via the "file" parameter to edit_html.cgi is not properly verified before being used to read files. This can be exploited to read arbitrary files from local resources.
Remote authenticated users can execute arbitrary code and view arbitrary files.
The vendor has issued a fix.