HTTP: Webmin Fake SessionID Initialization

This signature detects attempts to exploit a known vulnerability in Webmin. Webmin versions 1.050 to 1.060 are vulnerable. Attackers can send a maliciously crafted GET request to a Webmin server to bypass authorization for the Webmin interface and perform system administration tasks (such as adding and deleting users).

Extended Description

A vulnerability has been discovered in the 'Miniserv.pl' script used to invoke both Webmin and Usermin. Due to insufficient sanitization of client-supplied BASE64 encoded input, it is possible to inject a Session ID into the access control list. Successful exploitation of this vulnerability may allow an attacker to bypass typical authentication procedures, thus gaining adminstrative access to a webmin/usermin interface.

Affected Products

Sgi irix

Short Name
HTTP:PKG:WEBMIN-FAKE-SESSION
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2003-0101 Fake Initialization SessionID Webmin bid:6915
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Sgi

Webmin

Hp

Sco

Engarde_secure_linux

CVSS Score

10.0

Found a potential security threat?