CVE-2006-3392

N/A Unknown
Published: July 06, 2006 Modified: April 16, 2026
View on NVD

Description

Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/20892
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/21105
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21365
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/22556
Source: cve@mitre.org
Vendor Advisory
http://www.kb.cert.org/vuls/id/999601
Source: cve@mitre.org
US Government Resource
http://www.osvdb.org/26772
Source: cve@mitre.org
Patch
http://www.vupen.com/english/advisories/2006/2612
Source: cve@mitre.org
Vendor Advisory
http://attrition.org/pipermail/vim/2006-July/000923.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://attrition.org/pipermail/vim/2006-June/000912.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20892
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/21105
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21365
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/22556
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200608-11.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1199
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/999601
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:125
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26772
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securityfocus.com/archive/1/439653/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/440125/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/440466/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/440493/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/18744
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/2612
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.webmin.com/changes.html
Source: af854a3a-2127-422b-91ae-364da2661108

36 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
78.6%
99th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

webmin usermin