First published: Fri Jul 26 2002(Updated: )
(1) Webmin 0.96 and (2) Usermin 0.90 with password timeouts enabled allow local and possibly remote attackers to bypass authentication and gain privileges via certain control characters in the authentication information, which can force Webmin or Usermin to accept arbitrary username/session ID combinations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Usermin Usermin | =0.9 | |
Usermin Usermin | =0.8 | |
Webmin Webmin | =0.96 | |
Webmin Webmin | =0.93 | |
Webmin Webmin | =0.92 | |
Webmin Webmin | =0.95 | |
Webmin Webmin | =0.94 | |
Webmin Webmin | =0.91 | |
Usermin Usermin | =0.7 | |
Webmin Webmin | =0.92.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.