CVE-2002-2360
Published Dec 31, 2002
Last updated 16 years ago
Overview
- Description
- The RPC module in Webmin 0.21 through 0.99, when installed without root or admin privileges, allows remote attackers to read and write to arbitrary files and execute arbitrary commands via remote_foreign_require and remote_foreign_call requests.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:webmin:0.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84B5A02C-96AB-46FD-A958-86AC0DFD1F2A" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB1B8073-C512-4ACA-8E3F-92D46D63FBCF" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.31:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B368FAD0-39A7-4115-9327-1D32BECF2F7E" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.41:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B3D7B7A-0426-4176-A759-E96024DC492D" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.42:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E3EFDEE-A99B-4D0E-B6A7-E7C285A5DFBC" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.51:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50C3D4D4-246A-4287-AA42-CFDD0C1AE22A" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.76:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F05CF0BA-0606-42E5-A631-D302FF1D59F0" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.77:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A79B7B3-708A-42E4-B4EF-7746F6292DB5" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.78:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2F06BC0-0418-4A1C-BD4A-B7429A6CEA39" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.79:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1817FDA9-31F4-4D4A-A867-386D2F1CDB1C" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.80:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23522A64-FD03-4C5B-9A8A-5E7CDDC65CEE" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.85:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9A3F522-6E6D-446C-8694-7AE91F19F1C7" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.88:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBB86BC7-4A99-4C5B-9460-CDDA7C4E4041" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.91:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B0813F3-1886-481E-8822-4BD199C4934F" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.92:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D25A7CA-ED9D-4562-8965-D4906D1BE5FA" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.93:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1F2D028-F2F9-4CE0-A24B-7DB44D488D4E" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.94:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82EE7A9B-5688-4933-95B9-476873D44A65" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.950:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08068E84-9EE5-4742-B70A-567CD4199604" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.960:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C6D5F6A-B34F-4134-959F-C31FC84EBCF9" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.970:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB4FEC51-DD03-418D-8E55-CEE696BE2D74" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.980:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B9F8F43-F9EC-4BC0-BDF6-EC3EDF5A71F4" }, { "criteria": "cpe:2.3:a:webmin:webmin:0.990:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB6865E9-F244-4019-AA4C-3DB1655A6AA0" } ], "operator": "OR" } ] } ]