Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j92g-3wfv-qp43

Опубликовано: 16 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 7.1

Описание

Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account.

Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account.

EPSS

Процентиль: 15%
0.00048
Низкий

7.1 High

CVSS3

Дефекты

CWE-284

Связанные уязвимости

CVSS3: 7.1
nvd
3 месяца назад

Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account.

CVSS3: 7.1
debian
3 месяца назад

Webmin 2.510 is vulnerable to a Host Header Injection in the password ...

CVSS3: 7.1
fstec
3 месяца назад

Уязвимость функции get_webmin_email_url() панели управления хостингом Webmin, позволяющая нарушителю оказать воздействие на целостность и доступность защищаемой информации

CVSS3: 7.1
redos
2 месяца назад

Уязвимость webmin

EPSS

Процентиль: 15%
0.00048
Низкий

7.1 High

CVSS3

Дефекты

CWE-284