CVE-2024-36451

8.8 HIGH

📋 TL;DR

This vulnerability in Webmin's ajaxterm module allows unauthorized users to hijack console sessions when insufficient permissions are improperly handled. It affects Webmin versions prior to 2.003, potentially exposing system data, allowing webpage alteration, or causing server shutdowns.

💻 Affected Systems

Products:
  • Webmin
Versions: Versions prior to 2.003
Operating Systems: All platforms running Webmin
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the ajaxterm module specifically; Webmin installations with this module enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through session hijacking leading to data theft, website defacement, or permanent server shutdown.

🟠

Likely Case

Unauthorized access to console sessions resulting in data exposure or limited system manipulation.

🟢

If Mitigated

Minimal impact if proper access controls and network segmentation are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access but leverages improper permission handling.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.003

Vendor Advisory: https://webmin.com/

Restart Required: Yes

Instructions:

1. Backup your Webmin configuration. 2. Update Webmin to version 2.003 or later using the built-in update mechanism or package manager. 3. Restart the Webmin service.

🔧 Temporary Workarounds

Disable ajaxterm module

linux

Temporarily disable the vulnerable ajaxterm module to prevent exploitation.

webmin-config --disable ajaxterm

Restrict network access

all

Limit Webmin access to trusted IP addresses only.

Configure firewall rules to restrict access to Webmin port (default 10000)

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Webmin servers
  • Enforce strong authentication and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check Webmin version via web interface or command: cat /etc/webmin/version

Check Version:

cat /etc/webmin/version

Verify Fix Applied:

Verify version is 2.003 or higher and ajaxterm module is either updated or disabled.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to ajaxterm endpoints in Webmin logs
  • Unexpected console session creations

Network Indicators:

  • Unusual traffic patterns to Webmin's ajaxterm port

SIEM Query:

source="webmin.log" AND (ajaxterm OR session_hijack)

🔗 References

📤 Share & Export