Vulnerability Details : CVE-2012-4893
Multiple cross-site request forgery (CSRF) vulnerabilities in file/show.cgi in Webmin 1.590 and earlier allow remote attackers to hijack the authentication of privileged users for requests that (1) read files or execute (2) tar, (3) zip, or (4) gzip commands, a different issue than CVE-2012-2982.
Vulnerability category: Cross-site request forgery (CSRF)
Exploit prediction scoring system (EPSS) score for CVE-2012-4893
Probability of exploitation activity in the next 30 days: 0.10%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 41 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-4893
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2012-4893
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-4893
-
http://americaninfosec.com/research/index.html
404 Not Found
-
http://www.kb.cert.org/vuls/id/788478
VU#788478 - Webmin contains input validation vulnerabilitiesUS Government Resource
- http://www.americaninfosec.com/research/dossiers/AISG-12-001.pdf
Products affected by CVE-2012-4893
- cpe:2.3:a:gentoo:webmin:*:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.150:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.160:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.140:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.570:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.550:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.450:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.440:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.370:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.340:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.270:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.560:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.530:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.430:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.420:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.330:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.320:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.240:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.230:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.520:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.510:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.410:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.400:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.310:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.300:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.220:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.210:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.200:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.260:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.580:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.500:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.480:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.470:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.390:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.380:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.290:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.280:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.180:*:*:*:*:*:*:*
- cpe:2.3:a:gentoo:webmin:1.170:*:*:*:*:*:*:*