Korean
<< Back
VID 21992
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The TWiki software is vulnerable to a directory traversal vulnerability via the 'filename' parameter. TWiki is a Web-based collaboration platform designed for running a project development space, document management system, and a knowledge base, written in Perl. TWiki versions 4.0.0 through 4.0.4 could allow a remote attacker to traverse directories, caused by improper filtering of user-supplied input passed to '..' (dot dot) sequence in the 'filename' parameter. A remote attacker could exploit this vulnerability to remove directories required by the application and write arbitrary content to files on the affected host.

* References:
http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2006-4294
http://securitytracker.com/id?1016805
http://www.frsirt.com/english/advisories/2006/3524
http://secunia.com/advisories/21829

* Platforms Affected:
TWiki.org, TWiki versions 4.0.0 through 4.0.4
Any operating system Any version
Recommendation Upgrade to the TWiki version 4.0.4 and apply the latest Hotfix (3 or later), available from the TWiki Download Web site at http://twiki.org/cgi-bin/view/Codev/DownloadTWiki
Related URL CVE-2006-4294 (CVE)
Related URL 19907 (SecurityFocus)
Related URL 28822 (ISS)