Nessus Plugin #15827
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
[GLSA-200411-33] TWiki: Arbitrary command execution
- Family:
- Gentoo Local Security Checks
- Category:
- infos
- Copyright:
- (C) 2004 Michel Arboi
- Summary:
- TWiki: Arbitrary command execution
- Version:
- $Revision: 1.1 $
- Cve_id:
- CAN-2004-1037
- Bugtraq_id:
- -
- Xrefs:
- GLSA:200411-33
- Description:
- The remote host is affected by the vulnerability described in GLSA-200411-33
(TWiki: Arbitrary command execution)
The TWiki search function, which uses a shell command executed via
the Perl backtick operator, does not properly escape shell
metacharacters in the user-provided search string.
Impact
An attacker can insert malicious commands into a search request,
allowing the execution of arbitrary commands with the privileges of the
user running TWiki (usually the Web server user).
Workaround
There is no known workaround at this time.
References:
http://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithSearch
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1037
Solution:
All TWiki users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/twiki-20040902"
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.