Directory traversal vulnerability in bin/configure in TWiki before 4.2.3, when a certain step in the installation guide is skipped, allows remote attackers to read arbitrary files via a query string containing a .. (dot dot) in the image variable, and execute arbitrary files via unspecified vectors.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://secunia.com/advisories/31849 | third-party-advisory x_refsource_SECUNIA |
| https://www.exploit-db.com/exploits/6269 | exploit x_refsource_EXPLOIT-DB |
| http://securityreason.com/securityalert/4265 | third-party-advisory x_refsource_SREASON |
| http://secunia.com/advisories/31964 | third-party-advisory x_refsource_SECUNIA |
| http://www.kb.cert.org/vuls/id/RGII-7JEQ7L | x_refsource_CONFIRM |
| http://www.vupen.com/english/advisories/2008/2586 | vdb-entry x_refsource_VUPEN |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/45183 | vdb-entry x_refsource_XF |
| http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2008-3195 | x_refsource_CONFIRM |
| http://twiki.org/cgi-bin/view/Codev/TWikiRelease04x02x03#4_2_3_Bugfix_Highlights | x_refsource_CONFIRM |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/45182 | vdb-entry x_refsource_XF |
| http://www.kb.cert.org/vuls/id/362012 | third-party-advisory x_refsource_CERT-VN |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|