First published: Fri Jul 26 2002(Updated: )
(1) Webmin 0.96 and (2) Usermin 0.90 with password timeouts enabled allow local and possibly remote attackers to bypass authentication and gain privileges via certain control characters in the authentication information, which can force Webmin or Usermin to accept arbitrary username/session ID combinations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Webmin Usermin | =0.9 | |
Webmin Usermin | =0.8 | |
Webmin | =0.96 | |
Webmin | =0.93 | |
Webmin | =0.92 | |
Webmin | =0.95 | |
Webmin | =0.94 | |
Webmin | =0.91 | |
Webmin Usermin | =0.7 | |
Webmin | =0.92.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0757 is considered a high-severity vulnerability due to the potential for privilege escalation.
To fix CVE-2002-0757, upgrade Webmin and Usermin to the latest versions available that are not affected by this vulnerability.
CVE-2002-0757 affects Webmin versions up to 0.96 and Usermin versions up to 0.90.
Yes, CVE-2002-0757 can potentially be exploited both locally and remotely by an attacker.
CVE-2002-0757 is an authentication bypass vulnerability that allows attackers to bypass security measures.