Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 145829 - app-admin/{webmin|usermin} XSS issues (CVE-2006-4542)
Summary: app-admin/{webmin|usermin} XSS issues (CVE-2006-4542)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/21690/
Whiteboard: B4 [noglsa] vorlon
Keywords:
: 148900 148916 (view as bug list)
Depends on:
Blocks:
 
Reported: 2006-09-01 03:52 UTC by Sune Kloppenborg Jeppesen (RETIRED)
Modified: 2006-11-01 08:14 UTC (History)
6 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
webmin-1.300-postfix.patch (webmin-1.300-postfix.patch,965 bytes, patch)
2006-09-24 04:12 UTC, Alexander Skwar
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-09-01 03:52:26 UTC
Description:
Two vulnerabilities have been reported in Webmin and Usermin, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose potentially sensitive information.
 
 1) Some unspecified input passed via the URL isn't properly verified before being used. This can be exploited to disclose the source code of arbitrary CGI and Perl programs.
 
 2) Some unspecified input passed via the URL isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
 
 The vulnerabilities have been reported in the following versions:
 * Webmin versions prior to 1.296.
 * Usermin versions prior to 1.226.

Solution:
Webmin:
 The vulnerabilities have been fixed in the 1.296 development version.
 
 Usermin:
 The vulnerabilities have been fixed in the 1.226 development version.
Comment 1 Thierry Carrez (RETIRED) gentoo-dev 2006-09-02 02:01:36 UTC
eradicator please bump
Comment 2 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-09-19 00:35:17 UTC
SuperStu could you make another security bump?
Comment 3 Jakub Moc (RETIRED) gentoo-dev 2006-09-24 03:52:06 UTC
*** Bug 148900 has been marked as a duplicate of this bug. ***
Comment 4 Jakub Moc (RETIRED) gentoo-dev 2006-09-24 03:53:02 UTC
Current is 1.300
Comment 5 Alexander Skwar 2006-09-24 04:12:10 UTC
Created attachment 97935 [details, diff]
webmin-1.300-postfix.patch

The postfix patch doesn't apply cleanly anymore. Attached is a new version, which can be used with webmin 1.300.

Please see attachment (id=97933) for the patch output I got with the old version of the patch.
Comment 6 Jakub Moc (RETIRED) gentoo-dev 2006-09-24 05:46:37 UTC
*** Bug 148916 has been marked as a duplicate of this bug. ***
Comment 7 Caleb Cushing 2006-09-24 05:51:35 UTC
when is 1.3 going to be released in portage? 
Comment 8 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-09-26 13:01:15 UTC
-dev mailed.
Comment 9 Matthias Geerdsen (RETIRED) gentoo-dev 2006-10-15 12:45:20 UTC
could someone pls bump this.... the bug is way too old
stuart? web-apps? eradicator?


from webmin site:

Remote source code access and XSS bug
Effects Webmin versions below 1.296, and Usermin versions below 1.226, on any operating system.
    An attacker can view the source code of Webmin CGI and Perl programs using a specially crafted URL. Because the source code for Webmin is freely available, this issue should only be of concern to sites that have custom modules for which they want the source to remain hidden.
    The XSS bug makes use of a similar technique to craft a URL that can allow arbitrary Javascript to be executed in the user's browser if a malicious link is clicked on.
    Thanks for Keigo Yamazaki of Little eArth Corporation for finding this bug.

Comment 10 Jeremy Huddleston (RETIRED) gentoo-dev 2006-10-16 12:20:34 UTC
usermin and webmin have been updated in portage.
Comment 11 Matthias Geerdsen (RETIRED) gentoo-dev 2006-10-17 04:18:21 UTC
finally...

arches, pls test webmin-1.300/usermin-1.230 and mark stable if possible
Comment 12 Raúl Porcel (RETIRED) gentoo-dev 2006-10-17 09:23:13 UTC
In x86:

Both packages emerges and works fine.

Portage 2.1.1 (default-linux/x86/2006.1/desktop, gcc-4.1.1, glibc-2.4-r3, 2.6.17-gentoo-r8 i586)
=================================================================
System uname: 2.6.17-gentoo-r8 i586 AMD-K6(tm) 3D processor
Gentoo Base System version 1.12.5
Last Sync: Tue, 17 Oct 2006 13:50:01 +0000
distcc 2.18.3 i586-pc-linux-gnu (protocols 1 and 2) (default port 3632) [disabled]
ccache version 2.3 [enabled]
app-admin/eselect-compiler: [Not Present]
dev-java/java-config: [Not Present]
dev-lang/python:     2.4.3-r4
dev-python/pycrypto: 2.0.1-r5
dev-util/ccache:     2.3
dev-util/confcache:  [Not Present]
sys-apps/sandbox:    1.2.17
sys-devel/autoconf:  2.13, 2.59-r7
sys-devel/automake:  1.4_p6, 1.5, 1.6.3, 1.7.9-r1, 1.8.5-r3, 1.9.6-r2
sys-devel/binutils:  2.16.1-r3
sys-devel/gcc-config: 1.3.13-r4
sys-devel/libtool:   1.5.22
virtual/os-headers:  2.6.17-r1
ACCEPT_KEYWORDS="x86"
AUTOCLEAN="yes"
CBUILD="i586-pc-linux-gnu"
CFLAGS="-O2"
CHOST="i586-pc-linux-gnu"
CONFIG_PROTECT="/etc"
CONFIG_PROTECT_MASK="/etc/env.d /etc/gconf /etc/revdep-rebuild /etc/terminfo"
CXXFLAGS="-O2"
DISTDIR="/usr/portage/distfiles"
FEATURES="autoconfig ccache distlocks metadata-transfer sandbox sfperms strict"
GENTOO_MIRRORS="ftp://ftp.belnet.be/mirror/rsync.gentoo.org/gentoo/"
LINGUAS=""
PKGDIR="/usr/portage/packages"
PORTAGE_RSYNC_OPTS="--recursive --links --safe-links --perms --times --compress --force --whole-file --delete --delete-after --stats --timeout=180 --exclude='/distfiles' --exclude='/local' --exclude='/packages'"
PORTAGE_TMPDIR="/var/tmp"
PORTDIR="/usr/portage"
PORTDIR_OVERLAY="/usr/local/portage"
SYNC="rsync://rsync.belnet.be/packages/gentoo-portage"
USE="x86 bitmap-fonts bzip2 cairo cdr cli crypt dbus dlloader dri dvd dvdr eds elibc_glibc emboss encode fam firefox fortran gif gpm gstreamer hal input_devices_evdev input_devices_keyboard input_devices_mouse isdnlog jpeg kernel_linux ldap libg++ mad mikmod mp3 mpeg ncurses nptl nptlonly ogg opengl pam pcre perl png ppds pppd python qt3 qt4 quicktime readline reflection sdl session spell spl ssl tcpd truetype truetype-fonts type1-fonts udev unicode userland_GNU video_cards_apm video_cards_ark video_cards_ati video_cards_chips video_cards_cirrus video_cards_cyrix video_cards_dummy video_cards_fbdev video_cards_glint video_cards_i128 video_cards_i740 video_cards_i810 video_cards_imstt video_cards_mga video_cards_neomagic video_cards_nsc video_cards_nv video_cards_rendition video_cards_s3 video_cards_s3virge video_cards_savage video_cards_siliconmotion video_cards_sis video_cards_sisusb video_cards_tdfx video_cards_tga video_cards_trident video_cards_tseng video_cards_v4l video_cards_vesa video_cards_vga video_cards_via video_cards_vmware video_cards_voodoo vorbis win32codecs xml xorg xv zlib"
Unset:  CTARGET, EMERGE_DEFAULT_OPTS, INSTALL_MASK, LANG, LC_ALL, LDFLAGS, MAKEOPTS, PORTAGE_RSYNC_EXTRA_OPTS
Comment 13 Markus Rothe (RETIRED) gentoo-dev 2006-10-17 10:15:39 UTC
ppc64 stable
Comment 14 Markus Meier gentoo-dev 2006-10-17 11:20:02 UTC
1. both packages emerge fine on x86
2. pass collision test
3. both seem to work

emerge --info
Portage 2.1.1 (default-linux/x86/2006.1/desktop, gcc-4.1.1, glibc-2.4-r3, 2.6.17.13 i686)
=================================================================
System uname: 2.6.17.13 i686 AMD Athlon(TM) XP1800+
Gentoo Base System version 1.12.5
Last Sync: Tue, 17 Oct 2006 16:50:01 +0000
ccache version 2.3 [enabled]
app-admin/eselect-compiler: [Not Present]
dev-java/java-config: 1.3.7, 2.0.30
dev-lang/python:     2.3.5-r3, 2.4.3-r4
dev-python/pycrypto: 2.0.1-r5
dev-util/ccache:     2.3
dev-util/confcache:  [Not Present]
sys-apps/sandbox:    1.2.17
sys-devel/autoconf:  2.13, 2.59-r7
sys-devel/automake:  1.4_p6, 1.5, 1.6.3, 1.7.9-r1, 1.8.5-r3, 1.9.6-r2
sys-devel/binutils:  2.16.1-r3
sys-devel/gcc-config: 1.3.13-r4
sys-devel/libtool:   1.5.22
virtual/os-headers:  2.6.17-r1
ACCEPT_KEYWORDS="x86"
AUTOCLEAN="yes"
CBUILD="i686-pc-linux-gnu"
CFLAGS="-O2 -march=i686 -fomit-frame-pointer -pipe"
CHOST="i686-pc-linux-gnu"
CONFIG_PROTECT="/etc /usr/kde/3.5/env /usr/kde/3.5/share/config /usr/kde/3.5/shutdown /usr/share/X11/xkb /usr/share/config /usr/share/texmf/dvipdfm/config/ /usr/share/texmf/dvips/config/ /usr/share/texmf/tex/generic/config/ /usr/share/texmf/tex/platex/config/ /usr/share/texmf/xdvi/"
CONFIG_PROTECT_MASK="/etc/env.d /etc/env.d/java/ /etc/gconf /etc/java-config/vms/ /etc/revdep-rebuild /etc/terminfo"
CXXFLAGS="-O2 -march=i686 -fomit-frame-pointer -pipe"
DISTDIR="/usr/portage/distfiles"
EMERGE_DEFAULT_OPTS="--nospinner"
FEATURES="autoconfig ccache collision-protect distlocks fixpackages metadata-transfer parallel-fetch sandbox sfperms strict test userfetch userpriv usersandbox"
GENTOO_MIRRORS="http://mirror.switch.ch/mirror/gentoo/ http://gentoo.inode.at/"
LANG="en_GB.utf8"
LINGUAS="en de en_GB"
PKGDIR="/usr/portage/packages"
PORTAGE_RSYNC_OPTS="--recursive --links --safe-links --perms --times --compress --force --whole-file --delete --delete-after --stats --timeout=180 --exclude='/distfiles' --exclude='/local' --exclude='/packages'"
PORTAGE_TMPDIR="/var/tmp"
PORTDIR="/usr/portage"
PORTDIR_OVERLAY="/usr/local/portage/normal"
SYNC="rsync://192.168.2.1/gentoo-portage"
USE="x86 3dnow 3dnowext X a52 aac acpi alsa apache2 bash-completion berkdb bitmap-fonts bzip2 cairo cdr cli cracklib crypt css cups dbus divx4linux dlloader dri dts dvd dvdr dvdread elibc_glibc emboss exif fam ffmpeg firefox font-server fortran gdbm gif gnome gphoto2 gpm gstreamer gtk gtk2 gtkhtml hal input_devices_keyboard input_devices_mouse ipv6 isdnlog java jpeg kde kernel_linux ldap libclamav libg++ linguas_de linguas_en linguas_en_GB logitech-mouse mad mikmod mmx mmxext mono mozcalendar mozdevelop mozsvg mp3 mpeg ncurses network nls nptl nptlonly nvidia oav ogg opengl oss pam pcre perl png ppds pppd python qt qt3 qt4 quicktime readline reflection samba sdl seamonkey session spell spl ssl tcltk tcpd test tetex tiff truetype truetype-fonts type1-fonts udev unicode usb userland_GNU vcd video_cards_none video_cards_nv vorbis win32codecs xine xinerama xml xorg xorg-x11 xprint xv xvg xvid zlib"
Unset:  CTARGET, INSTALL_MASK, LC_ALL, LDFLAGS, MAKEOPTS, PORTAGE_RSYNC_EXTRA_OPTS
Comment 15 Chris Gianelloni (RETIRED) gentoo-dev 2006-10-17 15:39:40 UTC
x86 done
Comment 16 Jason Wever (RETIRED) gentoo-dev 2006-10-17 19:36:13 UTC
SPARC stable
Comment 17 Tobias Scherbaum (RETIRED) gentoo-dev 2006-10-18 11:34:48 UTC
ppc stable
Comment 18 René Nussbaumer (RETIRED) gentoo-dev 2006-10-20 01:43:54 UTC
stable on hppa.
Comment 19 Thomas Cort (RETIRED) gentoo-dev 2006-10-24 03:50:20 UTC
alpha stable.

arm & s390 are already stable, removing them from CC.
Comment 20 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-10-24 05:09:50 UTC
Thanks.

Time to vote: i vote no for a web application which has vulnerabilities regurlarly.
Comment 21 Wolf Giesen (RETIRED) gentoo-dev 2006-10-24 05:15:15 UTC
IMHO that is not a good base for a decision. If we feel this has issues on a regular basis, we should mask it like phpBB or at least make it unstable only, thus taking it out of the scope of GentooSecurity.
Comment 22 Caleb Cushing 2006-10-24 07:42:02 UTC
everything has vulnerabilities. the problem with this package is that it's not updated as soon as it could be. I believe this last bug was only a problem if you were using your own custom proprietary module. however a fix was available and a new build was available a month before the maintainer got the new version committed. 
Comment 23 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-10-24 10:04:51 UTC
> everything has vulnerabilities. 

as for Secunia, 3 advisories in 2006 until now, that makes webmin/usermin belong to the most usually vulnerable softwares. It's like phpBB and a few other web-apps.
Many other packages lack of responsive maintainers too, but they don't contain as many vulnerabilities per year.

Just for that, and because the impact is not critical at all, i vote no-glsa. (we won't issue a GLSA for each XSS discovered in webmin....)
Frilled is right: the masking of this package could be considered by the maintainers if this software reveals to be really often affected by known vulnerabilities.

> however a fix was available and a new build was available a month before the
> maintainer got the new version committed. 

A version bump may be long, that doesn't change anything to the GLSA publication decisions. But indeed, if a security bug is persistent on a package without maintainer, this package must be package.masked. Hopefully that's actually not the case for webmin/usermin thanks to Jeremy. :)
Comment 24 Matthias Geerdsen (RETIRED) gentoo-dev 2006-11-01 08:14:06 UTC
this is the description from <http://webmin.com/security.html>
<quote>
Remote source code access and XSS bug
Effects Webmin versions below 1.296, and Usermin versions below 1.226, on any operating system.
An attacker can view the source code of Webmin CGI and Perl programs using a specially crafted URL. Because the source code for Webmin is freely available, this issue should only be of concern to sites that have custom modules for which they want the source to remain hidden.
The XSS bug makes use of a similar technique to craft a URL that can allow arbitrary Javascript to be executed in the user's browser if a malicious link is clicked on.
Thanks for Keigo Yamazaki of Little eArth Corporation for finding this bug.
</quote>

/me votes no GLSA
(viewing public source code or XSS with this kind of application does not warrant a GLSA I think)