First published: Wed Mar 02 2022(Updated: )
Improper Access Control to Remote Code Execution in GitHub repository webmin/webmin prior to 1.990.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Webmin Webmin | <1.990 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0824 refers to an improper access control vulnerability in the GitHub repository of webmin/webmin prior to version 1.990, which may lead to remote code execution.
CVE-2022-0824 has a severity rating of 8.8, which is considered critical.
CVE-2022-0824 affects Webmin Webmin versions up to and excluding 1.990.
To fix CVE-2022-0824, it is recommended to update to version 1.990 or newer of Webmin Webmin.
You can find more information about CVE-2022-0824 on the following links: [Packet Storm Security - Webmin-1.984-Remote-Code-Execution](http://packetstormsecurity.com/files/166240/Webmin-1.984-Remote-Code-Execution.html), [Packet Storm Security - Webmin-1.984-File-Manager-Remote-Code-Execution](http://packetstormsecurity.com/files/169700/Webmin-1.984-File-Manager-Remote-Code-Execution.html), [GitHub Commit](https://github.com/webmin/webmin/commit/39ea464f0c40b325decd6a5bfb7833fa4a142e38).