Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.
http://www.webmin.com/changes.html
http://www.vupen.com/english/advisories/2006/2612
http://www.securityfocus.com/bid/18744
http://www.securityfocus.com/archive/1/440493/100/0/threaded
http://www.securityfocus.com/archive/1/440466/100/0/threaded
http://www.securityfocus.com/archive/1/440125/100/0/threaded
http://www.securityfocus.com/archive/1/439653/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDKSA-2006:125
http://www.kb.cert.org/vuls/id/999601
http://www.debian.org/security/2006/dsa-1199
http://security.gentoo.org/glsa/glsa-200608-11.xml
http://secunia.com/advisories/22556
http://secunia.com/advisories/21365
http://secunia.com/advisories/21105
http://secunia.com/advisories/20892