TWiki configure Script Arbitrary Command Execution

high Nessus Plugin ID 22123

Synopsis

The remote web server hosts a CGI script that is affected by an arbitrary command execution vulnerability.

Description

The version of TWiki installed on the remote host uses an unsafe 'eval' in the 'bin/configure' script that can be exploited by an unauthenticated attacker to execute arbitrary Perl code subject to the privileges of the web server user id.

Solution

Apply HotFix 2 or later for TWiki 4.0.4. Alternatively, restrict access to the TWiki configure script.

See Also

http://twiki.org/cgi-bin/view/Codev/SecurityAlertCmdExecWithConfigure

Plugin Details

Severity: High

ID: 22123

File Name: twiki_configure_cmd_exec.nasl

Version: 1.21

Type: remote

Family: CGI abuses

Published: 7/31/2006

Updated: 6/5/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:twiki:twiki

Required KB Items: installed_sw/TWiki

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Patch Publication Date: 7/26/2006

Vulnerability Publication Date: 7/27/2006

Reference Information

CVE: CVE-2006-3819

BID: 19188