10
CVSSv2

CVE-2003-0101

Published: 03/03/2003 Updated: 18/10/2016
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

miniserv.pl in (1) Webmin prior to 1.070 and (2) Usermin prior to 1.000 does not properly handle metacharacters such as line feeds and carriage returns (CRLF) in Base-64 encoded strings during Basic authentication, which allows remote malicious users to spoof a session ID and gain root privileges.

Vulnerable Product Search on Vulmon Subscribe to Product

usermin usermin 0.6

usermin usermin 0.7

usermin usermin 0.96

usermin usermin 0.97

usermin usermin 0.4

usermin usermin 0.5

usermin usermin 0.93

usermin usermin 0.94

usermin usermin 0.95

usermin usermin 0.8

usermin usermin 0.9

usermin usermin 0.98

usermin usermin 0.99

engardelinux guardian digital webtool 1.2

usermin usermin 0.91

usermin usermin 0.92

webmin webmin 1.0.50

webmin webmin 1.0.60

Vendor Advisories

miniservpl in the webmin package does not properly handle metacharacters, such as line feeds and carriage returns, in Base64-encoded strings used in Basic authentication This vulnerability allows remote attackers to spoof a session ID, and thereby gain root privileges For the stable distribution (woody) this problem has been fixed in version 09 ...

Exploits

source: wwwsecurityfocuscom/bid/6915/info A vulnerability has been discovered in the 'Miniservpl' script used to invoke both Webmin and Usermin Due to insufficient sanitization of client-supplied BASE64 encoded input, it is possible to inject a Session ID into the access control list Successful exploitation of this vulnerability may a ...