A vulnerability, which was classified as problematic, was found in Webmin 2.001. Affected is an unknown function of the file xterm/index.cgi. The manipulation leads to basic cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.003 is able to address this issue. The name of the patch is d3d33af3c0c3fd3a889c84e287a038b7a457d811. It is recommended to upgrade the affected component. VDB-212862 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/webmin/webmin/commit/d3d33af3c0c3fd3a889c84e287a038b7a457d811 | Patch Third Party Advisory |
https://vuldb.com/?id.212862 | Permissions Required Third Party Advisory VDB Entry |
https://github.com/webmin/webmin/releases/tag/2.003 | Third Party Advisory |
https://vuldb.com/?ctiid.212862 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2022-11-02 13:15
Updated : 2023-03-01 10:16
NVD link : CVE-2022-3844
Mitre link : CVE-2022-3844
JSON object : View
CWE
CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Products Affected
webmin
- webmin