Security for everyone

CVE-2006-3392 Scanner

Detects 'Directory Traversal' vulnerability in Webmin and Usermin affects v. Webmin before 1.290 and Usermin before 1.220.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

15 sec

Scan only one

Domain, Ipv4



Webmin and Usermin are web-based applications used for managing Unix-based systems. The former is primarily intended for system administrators, while the latter is designed for regular users. Both programs offer an intuitive graphical interface for managing users, domains, services, and files. Additionally, they provide tools for managing email, databases, and networking.

CVE-2006-3392 is a vulnerability that affects Webmin and Usermin versions prior to 1.290 and 1.220, respectively. The exploit occurs when the simplify_path function calls before decoding HTML. Hackers can tamper with directory paths using the dot-dot-slash (../) sequences and bypassing the removal of these sequences from filenames with other bytes like "%01."

Exploiting CVE-2006-3392 can lead to unauthorized access and the ability to read arbitrary files. Attackers can scour through sensitive text files, such as passwords and configuration files, to gain access to the entire system. More sinister attacks may involve the injection of malicious content into code files to execute malicious commands.

By using pro features of the platform, users can quickly and easily learn about vulnerabilities in their digital assets. With constant updates and monitoring, users can stay informed about potential threats and judiciously safeguard their systems. Taking preventative measures is critical in securing sensitive data and further penetrating corporate defenses.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture