Directory traversal vulnerability in bin/configure in TWiki prior to 4.2.3, when a certain step in the installation guide is skipped, allows remote malicious users to read arbitrary files via a query string containing a .. (dot dot) in the image variable, and execute arbitrary files via unspecified vectors.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
twiki twiki 4.1.0 |
||
twiki twiki 4.0.5 |
||
twiki twiki |
||
twiki twiki 4.0.4 |
||
twiki twiki 4.0.3 |
||
twiki twiki 4.1.1 |
||
twiki twiki 4.2.0 |
||
twiki twiki 4.0.0 |
||
twiki twiki 4.0 |
||
twiki twiki 4.1.2 |
||
twiki twiki 4.2.1 |
||
twiki twiki 4.0.2 |
||
twiki twiki 4.0.1 |