Vulnerability Note VU#999601

Webmin and Usermin fail to sanitize user input

Original Release date: 07 Jul 2006 | Last revised: 01 Aug 2006


Webmin and Usermin do not properly sanitize user input. This vulnerability may allow a remote, unauthenticated user to view any file on the system running Webmin or Usermin.



Webmin is popular web-based administration tool for Unix and Linux servers that allows system administrators to make changes to system processes.


Usermin offers an interface similar to Webmin, but is designed for regular users who are not responsible for system administration tasks.

The Problem

There is an input validation vulnerability in Usermin and Webmin that could allow a remote, unauthenticated attacker could view any file on the computer running Webmin or Usermin.


An attacker could read any file on the computer running Webmin or Usermin.


Usermin version Version 1.220 and Webmin version 1.290 have been released to address this vulnerability.

Restrict Access

Restrict access to the Webmin and Usermin servers to trusted hosts. Note that in addition to firewall and VPN access control methods, both Webmin and usermin can use SSH tunneling to provide additional layers of encryption and authorization.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
WebminUnknown-07 Jul 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



The Webmin team has reported this vulnerability.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: CVE-2006-3392
  • Date Public: 30 Jun 2006
  • Date First Published: 07 Jul 2006
  • Date Last Updated: 01 Aug 2006
  • Severity Metric: 9.53
  • Document Revision: 31


If you have feedback, comments, or additional information about this vulnerability, please send us email.