Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-53wc-rjf9-39m4

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).

miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).

EPSS

Процентиль: 84%
0.02204
Низкий

Связанные уязвимости

ubuntu
около 20 лет назад

miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).

nvd
около 20 лет назад

miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).

debian
около 20 лет назад

miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "ful ...

EPSS

Процентиль: 84%
0.02204
Низкий