TWiki %INCLUDE Parameter Arbitrary Command Injection

medium Nessus Plugin ID 20068

Synopsis

The remote web server hosts a CGI script that is affected by an arbitrary shell command execution vulnerability.

Description

According to its banner, the installed version of TWiki allows an attacker to manipulate input to the 'rev' parameter in order to execute arbitrary shell commands on the remote host subject to the privileges of the web server user id.

Solution

Apply the appropriate hotfix listed in the vendor advisory.

See Also

http://www.nessus.org/u?b15c2dd7

Plugin Details

Severity: Medium

ID: 20068

File Name: twiki_include_cmd_exec.nasl

Version: 1.21

Type: remote

Family: CGI abuses

Published: 10/20/2005

Updated: 6/5/2024

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:twiki:twiki

Required KB Items: Settings/ParanoidReport, installed_sw/TWiki

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Patch Publication Date: 9/27/2005

Vulnerability Publication Date: 9/28/2005

Reference Information

CVE: CVE-2005-3056

BID: 14960