{"api_version":"1","generated_at":"2026-04-23T10:40:11+00:00","cve":"CVE-2005-3042","urls":{"html":"https://cve.report/CVE-2005-3042","api":"https://cve.report/api/cve/CVE-2005-3042.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2005-3042","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2005-3042"},"summary":{"title":"CVE-2005-3042","description":"miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when \"full PAM conversations\" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).","state":"PUBLISHED","assigner":"mitre","published_at":"2005-09-22 10:03:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://www.webmin.com/changes-1.230.html","name":"http://www.webmin.com/changes-1.230.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"Changes since Webmin version 1.220","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:176","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:176","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories - Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2005-09/0257.html","name":"http://archives.neohapsis.com/archives/bugtraq/2005-09/0257.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Neohapsis Archives - Bugtraq - #0257 - [SNS Advisory No.83] Webmin/Usermin PAM Authentication Bypass Vulnerability","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/17282","name":"http://secunia.com/advisories/17282","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - SUSE Updates for Multiple Packages","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securityreason.com/securityalert/17","name":"http://securityreason.com/securityalert/17","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmin/Usermin PAM Authentication Bypass Vulnerability - SecurityReason.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.webmin.com/uchanges-1.160.html","name":"http://www.webmin.com/uchanges-1.160.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Changes since Usermin version 1.150","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/16858","name":"http://secunia.com/advisories/16858","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Webmin / Usermin PAM Authentication Bypass Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2005/1791","name":"http://www.vupen.com/english/advisories/2005/1791","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200509-17.xml","name":"http://www.gentoo.org/security/en/glsa/glsa-200509-17.xml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Gentoo Linux Documentation\n--\n  Webmin, Usermin: Remote code execution through PAM authentication","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.novell.com/linux/security/advisories/2005_24_sr.html","name":"http://www.novell.com/linux/security/advisories/2005_24_sr.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Security Announcement","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://jvn.jp/jp/JVN%2340940493/index.html","name":"http://jvn.jp/jp/JVN%2340940493/index.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"JVN#40940493: Webmin および Usermin における認証回避の脆弱性","mime":"text/xml","httpstatus":"200","archivestatus":"404"},{"url":"http://www.osvdb.org/19575","name":"http://www.osvdb.org/19575","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html","name":"http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"セキュリティ対策のラック｜情報を守るセキュリティ対策のパイオニア","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/14889","name":"http://www.securityfocus.com/bid/14889","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmin / Usermin Remote PAM Authentication Bypass Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://jvn.jp/jp/JVN#40940493/index.html","name":"JVN:JVN#40940493","refsource":"MITRE","tags":[],"title":"","mime":"text/plain","httpstatus":"404","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2005-3042","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3042","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2005","cve_id":"3042","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"usermin","cpe5":"usermin","cpe6":"1.150","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3042","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"webmin","cpe5":"webmin","cpe6":"1.2.20","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T22:53:30.475Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"16858","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/16858"},{"name":"17282","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17282"},{"name":"GLSA-200509-17","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200509-17.xml"},{"name":"19575","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/19575"},{"name":"17","tags":["third-party-advisory","x_refsource_SREASON","x_transferred"],"url":"http://securityreason.com/securityalert/17"},{"name":"14889","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/14889"},{"name":"ADV-2005-1791","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2005/1791"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html"},{"name":"MDKSA-2005:176","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:176"},{"name":"SUSE-SR:2005:024","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2005_24_sr.html"},{"name":"20050921 [SNS Advisory No.83] Webmin/Usermin PAM Authentication Bypass Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://archives.neohapsis.com/archives/bugtraq/2005-09/0257.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.webmin.com/changes-1.230.html"},{"name":"JVN#40940493","tags":["third-party-advisory","x_refsource_JVN","x_transferred"],"url":"http://jvn.jp/jp/JVN%2340940493/index.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.webmin.com/uchanges-1.160.html"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2005-09-20T00:00:00.000Z","descriptions":[{"lang":"en","value":"miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when \"full PAM conversations\" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return)."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2005-09-29T09:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"16858","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/16858"},{"name":"17282","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17282"},{"name":"GLSA-200509-17","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200509-17.xml"},{"name":"19575","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/19575"},{"name":"17","tags":["third-party-advisory","x_refsource_SREASON"],"url":"http://securityreason.com/securityalert/17"},{"name":"14889","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/14889"},{"name":"ADV-2005-1791","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2005/1791"},{"tags":["x_refsource_MISC"],"url":"http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html"},{"name":"MDKSA-2005:176","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:176"},{"name":"SUSE-SR:2005:024","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2005_24_sr.html"},{"name":"20050921 [SNS Advisory No.83] Webmin/Usermin PAM Authentication Bypass Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://archives.neohapsis.com/archives/bugtraq/2005-09/0257.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.webmin.com/changes-1.230.html"},{"name":"JVN#40940493","tags":["third-party-advisory","x_refsource_JVN"],"url":"http://jvn.jp/jp/JVN%2340940493/index.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.webmin.com/uchanges-1.160.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2005-3042","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when \"full PAM conversations\" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return)."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"16858","refsource":"SECUNIA","url":"http://secunia.com/advisories/16858"},{"name":"17282","refsource":"SECUNIA","url":"http://secunia.com/advisories/17282"},{"name":"GLSA-200509-17","refsource":"GENTOO","url":"http://www.gentoo.org/security/en/glsa/glsa-200509-17.xml"},{"name":"19575","refsource":"OSVDB","url":"http://www.osvdb.org/19575"},{"name":"17","refsource":"SREASON","url":"http://securityreason.com/securityalert/17"},{"name":"14889","refsource":"BID","url":"http://www.securityfocus.com/bid/14889"},{"name":"ADV-2005-1791","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2005/1791"},{"name":"http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html","refsource":"MISC","url":"http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html"},{"name":"MDKSA-2005:176","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:176"},{"name":"SUSE-SR:2005:024","refsource":"SUSE","url":"http://www.novell.com/linux/security/advisories/2005_24_sr.html"},{"name":"20050921 [SNS Advisory No.83] Webmin/Usermin PAM Authentication Bypass Vulnerability","refsource":"BUGTRAQ","url":"http://archives.neohapsis.com/archives/bugtraq/2005-09/0257.html"},{"name":"http://www.webmin.com/changes-1.230.html","refsource":"CONFIRM","url":"http://www.webmin.com/changes-1.230.html"},{"name":"JVN#40940493","refsource":"JVN","url":"http://jvn.jp/jp/JVN%2340940493/index.html"},{"name":"http://www.webmin.com/uchanges-1.160.html","refsource":"CONFIRM","url":"http://www.webmin.com/uchanges-1.160.html"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2005-3042","datePublished":"2005-09-22T04:00:00.000Z","dateReserved":"2005-09-22T00:00:00.000Z","dateUpdated":"2024-08-07T22:53:30.475Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2005-09-22 10:03:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:usermin:usermin:1.150:*:*:*:*:*:*:*","matchCriteriaId":"B443FCF7-5949-4084-BA55-74F45A8ADB66"},{"vulnerable":true,"criteria":"cpe:2.3:a:webmin:webmin:1.2.20:*:*:*:*:*:*:*","matchCriteriaId":"E815171B-B054-450F-A9B3-2D522161DD02"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2005","CveId":"3042","Ordinal":"1","Title":"CVE-2005-3042","CVE":"CVE-2005-3042","Year":"2005"},"notes":[{"CveYear":"2005","CveId":"3042","Ordinal":"1","NoteData":"miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when \"full PAM conversations\" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).","Type":"Description","Title":"CVE-2005-3042"},{"CveYear":"2005","CveId":"3042","Ordinal":"2","NoteData":"2005-09-22","Type":"Other","Title":"Published"},{"CveYear":"2005","CveId":"3042","Ordinal":"3","NoteData":"2005-09-29","Type":"Other","Title":"Modified"}]}}}