CVE-2002-0757
Summary
| CVE | CVE-2002-0757 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2002-08-12 04:00:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | (1) Webmin 0.96 and (2) Usermin 0.90 with password timeouts enabled allow local and possibly remote attackers to bypass authentication and gain privileges via certain control characters in the authentication information, which can force Webmin or Usermin to accept arbitrary username/session ID combinations. |
Risk And Classification
Primary CVSS: v2.0 7.5 from [email protected]
AV:N/AC:L/Au:N/C:P/I:P/A:P
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:L/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Usermin | Usermin | 0.7 | All | All | All |
| Application | Usermin | Usermin | 0.8 | All | All | All |
| Application | Usermin | Usermin | 0.9 | All | All | All |
| Application | Webmin | Webmin | 0.91 | All | All | All |
| Application | Webmin | Webmin | 0.92 | All | All | All |
| Application | Webmin | Webmin | 0.92.1 | All | All | All |
| Application | Webmin | Webmin | 0.93 | All | All | All |
| Application | Webmin | Webmin | 0.94 | All | All | All |
| Application | Webmin | Webmin | 0.95 | All | All | All |
| Application | Webmin | Webmin | 0.96 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| ISS X-Force Database: webmin-usermin-sessionid-spoof (9037): Webmin and Usermin could allow an attacker to spoof a session ID | af854a3a-2127-422b-91ae-364da2661108 | www.iss.net | Patch, Vendor Advisory |
| Webmin / Usermin Authentication Bypass Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Patch, Vendor Advisory |
| www.linux-mandrake.com/en/security/2002/MDKSA-2002-033.php | af854a3a-2127-422b-91ae-364da2661108 | www.linux-mandrake.com | Patch |
| SecurityFocus HOME Mailing List: BugTraq | af854a3a-2127-422b-91ae-364da2661108 | online.securityfocus.com | Exploit, Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.