CVE-2023-38305

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-38305
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-38305.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-38305
Published
2023-07-31T15:15:10Z
Modified
2024-09-03T04:33:00.034273Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in Webmin 2.021. The download functionality allows an attacker to exploit a Cross-Site Scripting (XSS) vulnerability. By providing a crafted download path containing a malicious payload, an attacker can inject arbitrary code, which is then executed within the context of the victim's browser when the download link is accessed.

References

Affected packages

Git / github.com/webmin/webmin

Affected ranges

Type
GIT
Repo
https://github.com/webmin/webmin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.700
1.710
1.720
1.730
1.740
1.750
1.760
1.770
1.780
1.790
1.800
1.801
1.810
1.820
1.830
1.831
1.840
1.850
1.860
1.870
1.880
1.890
1.900
1.910
1.920
1.930
1.940
1.941
1.950
1.951
1.953
1.954
1.955
1.960
1.962
1.970
1.972
1.973
1.974
1.979
1.980
1.982
1.983
1.984
1.990
1.991
1.993
1.994
1.995
1.996
1.997
1.998
1.999

2.*

2.000
2.001
2.003
2.010
2.011
2.012
2.013
2.020
2.021