Cross-site scripting (XSS) Stored in "Manage Folders" in Webmin Usermin version 1.840, which allow remote attackers to inject arbitrary web script or HTML via the "Folder Name" input.
Another Cross-site scripting (XSS) Stored in "Address Book" in Webmin Usermin version 1.840, which allow remote attackers to inject arbitrary web script or HTML via the "Address Book's Real Name" input.


Thanks for reporting this. We will look into fixing this.
Although, can you think of a real life exploitation of this bug, when this attack could actually be perpetrated agaist another user?
Hi,
In my opinion, this XSS vulnerability could be used with a CSRF vulnerability (if found).
An attacker could send a HTML page to the victim that execute a automatic/hidden POST request.
Enviado via e-mail seguro de Proton Mail.
------- Original Message -------
Em quinta-feira, 9 de junho de 2022 às 7:58 PM, Ilia iliajie@users.sourceforge.net escreveu:
For the issue with
list_folders.cgi, what was the full URL that triggers the issue? It's cut off in your screenshot..Thanks, Renan for reporting this. I have just fixed that.
Although, these are harmless, as referer check would block all requests to files in question.