Vulnerability Details : CVE-2006-3392
Public exploit exists!
Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.
Products affected by CVE-2006-3392
- cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*
- cpe:2.3:a:usermin:usermin:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-3392
71.90%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2006-3392
-
Webmin File Disclosure
Disclosure Date: 2006-06-30First seen: 2020-04-26auxiliary/admin/webmin/file_disclosureA vulnerability has been reported in Webmin and Usermin, which can be exploited by malicious people to disclose potentially sensitive information. The vulnerability is caused due to an unspecified error within the handling of an URL. This can be exploited to read the
CVSS scores for CVE-2006-3392
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2006-3392
-
http://www.securityfocus.com/archive/1/440466/100/0/threaded
-
http://www.securityfocus.com/archive/1/439653/100/0/threaded
-
http://www.webmin.com/changes.html
Webmin
-
http://attrition.org/pipermail/vim/2006-June/000912.html
-
http://www.debian.org/security/2006/dsa-1199
-
http://www.osvdb.org/26772
Patch
-
http://secunia.com/advisories/21105
Vendor Advisory
-
http://www.securityfocus.com/bid/18744
Webmin/Usermin Unspecifed Information Disclosure Vulnerability
-
http://attrition.org/pipermail/vim/2006-July/000923.html
-
http://secunia.com/advisories/20892
Patch;Vendor Advisory
-
http://security.gentoo.org/glsa/glsa-200608-11.xml
-
http://secunia.com/advisories/22556
Vendor Advisory
-
http://www.vupen.com/english/advisories/2006/2612
Vendor Advisory
-
http://www.securityfocus.com/archive/1/440125/100/0/threaded
-
http://www.securityfocus.com/archive/1/440493/100/0/threaded
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:125
-
http://www.kb.cert.org/vuls/id/999601
US Government Resource
-
http://secunia.com/advisories/21365
Patch;Vendor Advisory
Jump to