CVE-2022-0824
📋 TL;DR
This vulnerability in Webmin allows attackers to bypass access controls and execute arbitrary code remotely on affected systems. It affects Webmin installations prior to version 1.990, potentially compromising the entire server.
💻 Affected Systems
- Webmin
📦 What is this software?
Webmin by Webmin
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with root-level access, data theft, lateral movement, and persistent backdoor installation.
Likely Case
Unauthorized file system access, privilege escalation, and remote code execution leading to service disruption.
If Mitigated
Limited impact if proper network segmentation and least privilege access are enforced.
🎯 Exploit Status
Exploits require authentication but bypass access controls; multiple public exploit scripts exist.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.990 and later
Vendor Advisory: https://github.com/webmin/webmin/commit/39ea464f0c40b325decd6a5bfb7833fa4a142e38
Restart Required: No
Instructions:
1. Update Webmin to version 1.990 or later via the built-in update module or package manager. 2. Verify the update completed successfully. 3. Restart Webmin service if not automatic.
🔧 Temporary Workarounds
Disable File Manager module
linuxTemporarily disable the vulnerable File Manager module to prevent exploitation.
sudo /usr/share/webmin/disable-module.pl filemin
Restrict network access
linuxLimit Webmin access to trusted IP addresses only using firewall rules.
sudo iptables -A INPUT -p tcp --dport 10000 -s TRUSTED_IP -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 10000 -j DROP
🧯 If You Can't Patch
- Implement strict network ACLs to allow only trusted sources to access Webmin.
- Monitor Webmin logs for unauthorized access attempts and file modification activities.
🔍 How to Verify
Check if Vulnerable:
Check Webmin version via web interface or command: cat /etc/webmin/version
Check Version:
cat /etc/webmin/version
Verify Fix Applied:
Confirm version is 1.990 or higher and test File Manager access controls.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized file operations in /var/webmin/filemin/ logs
- Suspicious command execution via File Manager
Network Indicators:
- Unexpected connections to Webmin port 10000
- POST requests to filemin endpoints with malicious payloads
SIEM Query:
source="webmin.log" AND ("filemin" OR "unauthorized access")
🔗 References
- http://packetstormsecurity.com/files/166240/Webmin-1.984-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/169700/Webmin-1.984-File-Manager-Remote-Code-Execution.html
- https://github.com/webmin/webmin/commit/39ea464f0c40b325decd6a5bfb7833fa4a142e38
- https://huntr.dev/bounties/d0049a96-de90-4b1a-9111-94de1044f295
- https://notes.netbytesec.com/2022/03/webmin-broken-access-control-to-post-auth-rce.html
- http://packetstormsecurity.com/files/166240/Webmin-1.984-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/169700/Webmin-1.984-File-Manager-Remote-Code-Execution.html
- https://github.com/webmin/webmin/commit/39ea464f0c40b325decd6a5bfb7833fa4a142e38
- https://huntr.dev/bounties/d0049a96-de90-4b1a-9111-94de1044f295
- https://notes.netbytesec.com/2022/03/webmin-broken-access-control-to-post-auth-rce.html