Webmin Symlink Vulnerability

BID:2399

Info

Webmin Symlink Vulnerability

Bugtraq ID: 2399
Class: Access Validation Error
CVE:
Remote: No
Local: Yes
Published: Jan 17 2001 12:00AM
Updated: Jan 17 2001 12:00AM
Credit: Reported to bugtraq in a Caldera Security Advisory dated January 17, 2001.
Vulnerable: Webmin Webmin 0.8.5 Red Hat
+ Redhat Linux 7.0
Webmin Webmin 0.8.3
- Caldera OpenLinux 2.4
- Caldera OpenLinux 2.4
- Caldera OpenLinux 2.3
- Caldera OpenLinux 2.3
- MandrakeSoft Corporate Server 1.0.1
- Mandriva Linux Mandrake 7.2
- Mandriva Linux Mandrake 7.2
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.1
Not Vulnerable: Webmin Webmin 0.8.4
- Caldera OpenLinux Desktop 2.3
- Caldera OpenLinux Desktop 2.3
- Mandriva Linux Mandrake 7.2
- Mandriva Linux Mandrake 7.2
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.1
- SCO eDesktop 2.4
- SCO eDesktop 2.4
- SCO eServer 2.3.1

Discussion

Webmin Symlink Vulnerability

Webmin is a web-based administration interface for Unix systems. Versions of Webmin make use of insecurely-created tempfiles.

Webmin's tempfiles are named in a way that is guessable in advance by a malicious user. This allows an attacker to create a symbolic link with the same name as Webmin's tempfile, and which points to another file which is the target of attack.

When Webmin attempts to write to the predictably-named temporary file, the already-created symbolic link will lead the program to overwrite the symlink's target with the privilege of the webserver process.

Properly exploited, this type of attack may lead to local root access for the attacker.

It has been reported that a number of vulnerable Webmin RPMs are still in circulation and many Linux distributions do not appear to have sufficiently patched this issue. For example, insecure temporary file creation is still known to be prevalent in some post-Webmin 0.8.3 RPMs.

Users are advised to upgrade to the most recent version to avoid any aforementioned problems with the creation of insecure temporary files.
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report