Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200707-05 ] Webmin, Usermin: Cross-site scripting vulnerabilities
Date: Fri, 06 Jul 2007 08:46:58
Message-Id: 20070705225627.GB14315@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200707-05
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Low
8 Title: Webmin, Usermin: Cross-site scripting vulnerabilities
9 Date: July 05, 2007
10 Bugs: #181385
11 ID: 200707-05
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Webmin and Usermin are vulnerable to cross-site scripting
19 vulnerabilities (XSS).
20
21 Background
22 ==========
23
24 Webmin is a web-based administrative interface for Unix-like systems.
25 Usermin is a simplified version of Webmin designed for use by normal
26 users rather than system administrators.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 app-admin/webmin < 1.350 >= 1.350
35 2 app-admin/usermin < 1.280 >= 1.280
36 -------------------------------------------------------------------
37 2 affected packages on all of their supported architectures.
38 -------------------------------------------------------------------
39
40 Description
41 ===========
42
43 The pam_login.cgi file does not properly sanitize user input before
44 sending it back as output to the user.
45
46 Impact
47 ======
48
49 An unauthenticated attacker could entice a user to browse a specially
50 crafted URL, allowing for the execution of script code in the context
51 of the user's browser and for the theft of browser credentials. This
52 may permit the attacker to login to Webmin or Usermin with the user's
53 permissions.
54
55 Workaround
56 ==========
57
58 There is no known workaround at this time.
59
60 Resolution
61 ==========
62
63 All Webmin users should update to the latest stable version:
64
65 # emerge --sync
66 # emerge --ask --verbose --oneshot ">=app-admin/webmin-1.350"
67
68 All Usermin users should update to the latest stable version:
69
70 # emerge --sync
71 # emerge --ask --verbose --oneshot ">=app-admin/usermin-1.280"
72
73 References
74 ==========
75
76 [ 1 ] CVE-2007-3156
77 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3156
78
79 Availability
80 ============
81
82 This GLSA and any updates to it are available for viewing at
83 the Gentoo Security Website:
84
85 http://security.gentoo.org/glsa/glsa-200707-05.xml
86
87 Concerns?
88 =========
89
90 Security is a primary focus of Gentoo Linux and ensuring the
91 confidentiality and security of our users machines is of utmost
92 importance to us. Any security concerns should be addressed to
93 security@g.o or alternatively, you may file a bug at
94 http://bugs.gentoo.org.
95
96 License
97 =======
98
99 Copyright 2007 Gentoo Foundation, Inc; referenced text
100 belongs to its owner(s).
101
102 The contents of this document are licensed under the
103 Creative Commons - Attribution / Share Alike license.
104
105 http://creativecommons.org/licenses/by-sa/2.5