| Summary: | www-apps/twiki <4.2.3 config script command execution (CVE-2008-{3195,4112}) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED FIXED | ||
| Severity: | trivial | ||
| Priority: | High | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://www.kb.cert.org/vuls/id/362012 | ||
| Whiteboard: | ~1 [noglsa] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Robert Buchholz (RETIRED)
2008-09-16 14:40:28 UTC
CVE-2008-4112 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4112): Directory traversal vulnerability in bin/configure in TWiki before 4.2.3, when a certain step in the installation guide is skipped, allows remote attackers to read arbitrary files via a query string containing a .. (dot dot) in the image variable. CVE-2008-3195 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3195): Directory traversal vulnerability in bin/configure in TWiki before 4.2.3, when a certain step in the installation guide is skipped, allows remote attackers to read arbitrary files via a query string containing a .. (dot dot) in the image variable, and execute arbitrary files via unspecified vectors. Added twiki-4.2.3, removed vulnerable -4.1.2, -4.2.0, -4.2.2. Unstable on all arches. Webapps done. |