6.4
CVSSv2

CVE-2014-7236

Published: 17/02/2020 Updated: 20/02/2020
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 645
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

Eval injection vulnerability in lib/TWiki/Plugins.pm in TWiki prior to 6.0.1 allows remote malicious users to execute arbitrary Perl code via the debugenableplugins parameter to do/view/Main/WebHome.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

twiki twiki

twiki twiki 6.0

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'T ...
TWiki versions 40x through 600 contain a vulnerability in the Debug functionality The value of the debugenableplugins parameter is used without proper sanitization in an Perl eval statement which allows remote code execution ...
The debugenableplugins request parameter in Twiki versions 4x, 5x, and 600 allows arbitrary Perl code execution ...

Github Repositories

Exploit for CVE-2014-7236

Exploit for TWiki code execution CVE-2014-7236 usage: perl exploitpl host [cmd] ex perl exploitpl 127001/Main/WebHome "uname -a" Reference: seclistsorg/fulldisclosure/2014/Oct/44