Bug 16168 - webmin new XSS security issue in xmlrpc.cgi fixed upstream in 1.760 (CVE-2015-1990)
Summary: webmin new XSS security issue in xmlrpc.cgi fixed upstream in 1.760 (CVE-2015...
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/656990/
Whiteboard: MGA4TOO has_procedure advisory MGA4-3...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-06-22 00:30 CEST by David Walser
Modified: 2015-09-09 19:51 CEST (History)
2 users (show)

See Also:
Source RPM: webmin-1.730-2.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-06-22 00:30:15 CEST
Webmin 1.760 has been released today (June 21).  The changelog is here:
https://github.com/webmin/webmin/commit/41b8d4da9a0874a2d764957ac92146273058515f

The security issue, referred to by this comment:
"Fixed an XSS bug that allowed xmlrpc.cgi to be abused by a malicious link."

was fixed in this commit:
https://github.com/webmin/webmin/commit/caea0eee60b70aebc0e3dba11480296f81d99b20

Reproducible: 

Steps to Reproduce:
David Walser 2015-06-22 00:30:22 CEST

Whiteboard: (none) => MGA4TOO

Comment 1 David Walser 2015-09-02 18:23:29 CEST
This has been listed on upstream's security page with a CVE:
http://www.webmin.com/security.html

Updated packages uploaded for Mageia 4, Mageia 5, and Cauldron.

Advisory:
========================

Updated webmin package fixes security vulnerability:

A malicious website could create links or Javascript referencing the xmlrpc.cgi
script, triggered when a user logged into Webmin visits the attacking site
(CVE-2015-1990).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1990
http://www.webmin.com/changes.html
http://www.webmin.com/security.html
========================

Updated packages in core/updates_testing:
========================
webmin-1.760-1.mga4
webmin-1.760-1.mga5

from SRPMS:
webmin-1.760-1.mga4.src.rpm
webmin-1.760-1.mga5.src.rpm

Assignee: bugsquad => qa-bugs
Summary: webmin new XSS security issue in xmlrpc.cgi fixed upstream in 1.760 => webmin new XSS security issue in xmlrpc.cgi fixed upstream in 1.760 (CVE-2015-1990)

Comment 2 William Kenney 2015-09-05 20:52:03 CEST
In VirtualBox, M4, KDE, 32-bit

Package(s) under test:
webmin

default install of webmin

[root@localhost wilcal]# urpmi webmin
Package webmin-1.730-1.mga4.noarch is already installed

webmin is accessible at:
https://localhost:10000/
I can view the Hardware -> Partitions on Local Disks
I can view Servers -> Apache/ProFTPD/SSH
I can access webmin and do the same from another M5 system on the LAN at:
https://192.168.1.140:10000/

install webmin from updates_testing
stop and restart webmin

[root@localhost wilcal]# urpmi webmin
Package webmin-1.760-1.mga4.noarch is already installed

webmin is accessible at:
https://localhost:10000/
I can view the Hardware -> Partitions on Local Disks
I can view Servers -> Apache/ProFTPD/SSH
I can access webmin and do the same from another M5 system on the LAN at:
https://192.168.1.140:10000/

CC: (none) => wilcal.int
Whiteboard: MGA4TOO => MGA4TOO MGA4-32-OK

Comment 3 William Kenney 2015-09-05 21:07:14 CEST
In VirtualBox, M4, KDE, 64-bit

Package(s) under test:
webmin

default install of webmin

[root@localhost wilcal]# urpmi webmin
Package webmin-1.730-1.mga4.noarch is already installed

webmin is accessible at:
https://localhost:10000/
I can view the Hardware -> Partitions on Local Disks
I can view Servers -> Apache/ProFTPD/SSH
I can access webmin and do the same from another M5 system on the LAN at:
https://192.168.1.142:10000/

install webmin from updates_testing
stop and restart webmin

[root@localhost wilcal]# urpmi webmin
Package webmin-1.760-1.mga4.noarch is already installed

webmin is accessible at:
https://localhost:10000/
I can view the Hardware -> Partitions on Local Disks
I can view Servers -> Apache/ProFTPD/SSH
I can access webmin and do the same from another M5 system on the LAN at:
https://192.168.1.142:10000/
Comment 4 William Kenney 2015-09-05 21:20:55 CEST
In VirtualBox, M5, KDE, 32-bit

Package(s) under test:
webmin

default install of webmin

[root@localhost wilcal]# urpmi webmin
Package webmin-1.730-2.mga5.noarch is already installed

webmin is accessible at:
https://localhost:10000/
I can view the Hardware -> Partitions on Local Disks
I can view Servers -> Apache/ProFTPD/SSH
I can access webmin and do the same from another M5 system on the LAN at:
https://192.168.1.143:10000/

install webmin from updates_testing
stop and restart webmin

[root@localhost wilcal]# urpmi webmin
Package webmin-1.760-1.mga5.noarch is already installed

webmin is accessible at:
https://localhost:10000/
I can view the Hardware -> Partitions on Local Disks
I can view Servers -> Apache/ProFTPD/SSH
I can access webmin and do the same from another M5 system on the LAN at:
https://192.168.1.143:10000/

Whiteboard: MGA4TOO MGA4-32-OK => MGA4TOO MGA4-32-OK MGA4-64-OK MGA5-32-OK

Comment 5 William Kenney 2015-09-05 21:32:19 CEST
In VirtualBox, M5, KDE, 64-bit

Package(s) under test:
webmin

default install of webmin

[root@localhost wilcal]# urpmi webmin
Package webmin-1.730-2.mga5.noarch is already installed

webmin is accessible at:
https://localhost:10000/
I can view the Hardware -> Partitions on Local Disks
I can view Servers -> Apache/ProFTPD/SSH
I can access webmin and do the same from another M5 system on the LAN at:
https://192.168.1.141:10000/

install webmin from updates_testing
stop and restart webmin

[root@localhost wilcal]# urpmi webmin
Package webmin-1.760-1.mga5.noarch is already installed

webmin is accessible at:
https://localhost:10000/
I can view the Hardware -> Partitions on Local Disks
I can view Servers -> Apache/ProFTPD/SSH
I can access webmin and do the same from another M5 system on the LAN at:
https://192.168.1.141:10000/

Whiteboard: MGA4TOO MGA4-32-OK MGA4-64-OK MGA5-32-OK => MGA4TOO MGA4-32-OK MGA4-64-OK MGA5-32-OK MGA5-64-OK

Comment 6 William Kenney 2015-09-05 21:32:53 CEST
This update works fine.
Testing complete for MGA4 & MGA5, 32-bit & 64-bit
Validating the update.
Could someone from the sysadmin team push to updates.
Thanks

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 7 claire robinson 2015-09-08 15:25:46 CEST
Advisory uploaded.

Whiteboard: MGA4TOO MGA4-32-OK MGA4-64-OK MGA5-32-OK MGA5-64-OK => MGA4TOO has_procedure advisory MGA4-32-OK MGA4-64-OK MGA5-32-OK MGA5-64-OK

Comment 8 Mageia Robot 2015-09-08 19:57:23 CEST
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0344.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED

David Walser 2015-09-09 19:51:00 CEST

URL: (none) => http://lwn.net/Vulnerabilities/656990/


Note You need to log in before you can comment on or make changes to this bug.