GLSA 200608-11: Webmin, Usermin: File Disclosure

Severity:normal
Title:Webmin, Usermin: File Disclosure
Date:08/06/2006
Bugs: #138552
ID:200608-11

Synopsis

Webmin and Usermin are vulnerable to an arbitrary file disclosure through a specially crafted URL.

Background

Webmin is a web-based interface for Unix-like systems. Usermin is a simplified version of Webmin designed for use by normal users rather than system administrators.

Affected packages

Package Vulnerable Unaffected Architecture(s)
app-admin/webmin < 1.290 >= 1.290 All supported architectures
app-admin/usermin < 1.220 >= 1.220 All supported architectures

Description

A vulnerability in both Webmin and Usermin has been discovered by Kenny Chen, wherein simplify_path is called before the HTML is decoded.

Impact

A non-authenticated user can read any file on the server using a specially crafted URL.

Workaround

For a temporary workaround, IP Access Control can be setup on Webmin and Usermin.

Resolution

All Webmin users should update to the latest stable version:

    # emerge --sync
    # emerge --ask --verbose --oneshot ">=app-admin/webmin-1.290"

All Usermin users should update to the latest stable version:

# emerge --sync # emerge --ask --verbose --oneshot ">=app-admin/usermin-1.220"

References

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200608-11.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

Thank you!