
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in Webmin 2.021 affecting the download functionality. The vulnerability (CVE-2023-38305) allows attackers to exploit a Cross-Site Scripting (XSS) vulnerability by providing a crafted download path containing a malicious payload. When the download link is accessed, the injected arbitrary code is executed within the context of the victim's browser (NVD).
The vulnerability has been assigned a CVSS v3.1 Base Score of 6.1 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The issue specifically affects the URLs to download parameter functionality. The vulnerability is classified as CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (NVD).
When successfully exploited, this vulnerability allows attackers to inject and execute arbitrary code within the victim's browser context. This can lead to potential theft of sensitive information, session hijacking, or other malicious actions performed in the context of the authenticated user's session (Github Exploit).
Users should upgrade to a version newer than Webmin 2.021. The vulnerability has been addressed in subsequent releases as indicated in the Webmin changelog (Webmin Changelog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."