An issue was discovered in Webmin 1.840 and 1.880 when the default Yes setting of "Can view any file as a log file" is enabled. As a result of weak default configuration settings, limited users have full access rights to the underlying Unix system files, allowing the user to read sensitive data from the local system (using Local File Include) such as the '/etc/shadow' file via a "GET /syslog/save_log.cgi?view=1&file=/etc/shadow" request.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.7elements.co.uk/resources/technical-advisories/webmin-1-840-1-880-unrestricted-access-arbitrary-files-using-local-file-include/ - Issue Tracking |
Information
Published : 2018-03-14 19:29
Updated : 2024-11-21 04:14
NVD link : CVE-2018-8712
Mitre link : CVE-2018-8712
CVE.ORG link : CVE-2018-8712
JSON object : View
Products Affected
webmin
- webmin
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')