QID 730087

Date Published: 2021-05-19

QID 730087: Webmin Cross Site Request Forgery Vulnerability

Webmin is a web-based interface for system administration for Unix, although recent versions can also be installed and run on Windows. If Webmin is installed using the non-recommended setup.pl script, checking for unknown refers is not enabled by default. This opens the system up to XSS and CSRF attacks using malicious links. Fortunately the standard RPM, Deb, TAR and Solaris packages do not use this script and so are not vulnerable. If you did install using the setup.pl script, the vulnerability can be fixed by adding the line referers_none=1 to /etc/webmin/config

Affected Versions:
Webmin less or equal to 1.973.

QID Detection Logic:
This QID sends specially crafted GET/POST request to check if the target is vulnerable or not.

Successful exploitation would allow an authenticated attacker to gain control over the target system.

  • CVSS V3 rated as Critical - 9.6 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    For more information visit here.
    Vendor References

    CVEs related to QID 730087

    Software Advisories
    Advisory ID Software Component Link
    Webmin URL Logo www.webmin.com/security.html