Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Webmin / Usermin Null Filtering Vulnerabilities

Vulnerability Assessment Details

Webmin / Usermin Null Filtering Vulnerabilities

Vulnerability Assessment Summary
Checks if nulls in a URL are filtered by

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server is affected by multiple issues.

Description :

The remote host is running Webmin or Usermin, web-based interfaces for
Unix / Linux system administrators and end-users.

Webmin and Usermin both come with the Perl script '' to
provide basic web services, and the version of '' installed
on the remote host fails to properly filter null characters from URLs.
A possible hacker may be able to exploit this to reveal the source code of CGI
scripts, obtain directory listings, or launch cross-site scripting
attacks against the affected application.

See also :

Solution :

Upgrade to Webmin version 1.296 / Usermin 1.226 or later.

Network Security Threat Level:

High / CVSS Base Score : 7.0

Networks Security ID: 19820

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors


No Discussions have been posted on this vulnerability.