First published: Mon Jul 31 2023(Updated: )
An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the configuration settings of the system logs functionality. The vulnerability allows an attacker to store an XSS payload in the configuration settings of specific log files. This results in the execution of that payload whenever the affected log files are accessed.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Webmin Webmin | =2.021 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-38310 is medium, with a severity value of 5.4.
The affected software for CVE-2023-38310 is Webmin 2.021.
CVE-2023-38310 affects Webmin by allowing an attacker to store a cross-site scripting payload in the configuration settings of specific log files.
Yes, a fix is available for CVE-2023-38310. It is recommended to update Webmin to a version that resolves the vulnerability.
You can find more information about CVE-2023-38310 at the following references: [GitHub](https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38310) and [Webmin changelog](https://webmin.com/tags/webmin-changelog/).