CVE-2003-0101
Summary
| CVE | CVE-2003-0101 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2003-03-03 05:00:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | miniserv.pl in (1) Webmin before 1.070 and (2) Usermin before 1.000 does not properly handle metacharacters such as line feeds and carriage returns (CRLF) in Base-64 encoded strings during Basic authentication, which allows remote attackers to spoof a session ID and gain root privileges. |
Risk And Classification
Primary CVSS: v2.0 10 from [email protected]
AV:N/AC:L/Au:N/C:C/I:C/A:C
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Engardelinux | Guardian Digital Webtool | 1.2 | All | All | All |
| Application | Usermin | Usermin | 0.4 | All | All | All |
| Application | Usermin | Usermin | 0.5 | All | All | All |
| Application | Usermin | Usermin | 0.6 | All | All | All |
| Application | Usermin | Usermin | 0.7 | All | All | All |
| Application | Usermin | Usermin | 0.8 | All | All | All |
| Application | Usermin | Usermin | 0.9 | All | All | All |
| Application | Usermin | Usermin | 0.91 | All | All | All |
| Application | Usermin | Usermin | 0.92 | All | All | All |
| Application | Usermin | Usermin | 0.93 | All | All | All |
| Application | Usermin | Usermin | 0.94 | All | All | All |
| Application | Usermin | Usermin | 0.95 | All | All | All |
| Application | Usermin | Usermin | 0.96 | All | All | All |
| Application | Usermin | Usermin | 0.97 | All | All | All |
| Application | Usermin | Usermin | 0.98 | All | All | All |
| Application | Usermin | Usermin | 0.99 | All | All | All |
| Application | Webmin | Webmin | 1.0.50 | All | All | All |
| Application | Webmin | Webmin | 1.0.60 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Secunia - Advisories - Mandrake updates for webmin | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| ISS X-Force Database:webmin-usermin-root-access(11390): Webmin and Usermin session ID spoofing root access | af854a3a-2127-422b-91ae-364da2661108 | www.iss.net | Vendor Advisory |
| Neohapsis Archives - EnGarde security advisories - [ESA-20030225-006] WebTool session ID spoofing vulnerability. - From engarde-announce-admins_at_guardiandigital.com | af854a3a-2127-422b-91ae-364da2661108 | archives.neohapsis.com | |
| LinuxSecurity.com: Gentoo: webmin Unauthorized access vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.linuxsecurity.com | |
| Secunia - Advisories - Webmin Authentication Bypass Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| '[SNS Advisory No.62] Webmin/Usermin Session ID Spoofing Vulnerability "Episode 2"' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| 'Webmin version 1.070 released - fixes security hole' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| Neohapsis Archives - HP Security Digests - #0063 - HP-UX security bulletins digest | af854a3a-2127-422b-91ae-364da2661108 | archives.neohapsis.com | |
| 'GLSA: usermin (200302-14)' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| 'Webmin 1.050 - 1.060 remote exploit' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| N-058: Vulnerabilities in Webmin/Usermin | af854a3a-2127-422b-91ae-364da2661108 | www.ciac.org | |
| SecurityTracker.com Archives - Webmin Input Validation Flaw in 'miniserv.pl' May Let Remote Users Spoof Session IDs and Gain Root Access | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| Advisories - Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| Webmin/Usermin Session ID Spoofing Unauthenticated Access Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| patches.sgi.com/support/free/security/advisories/20030602-01-I | af854a3a-2127-422b-91ae-364da2661108 | patches.sgi.com | |
| SecureNet Service: SNS Advisory | af854a3a-2127-422b-91ae-364da2661108 | www.lac.co.jp | |
| Debian -- Security Information -- DSA-319-1 webmin | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.