Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/28049 | vdb entry |
http://securitytracker.com/id?1016603 | vdb entry |
http://secunia.com/advisories/21235 | third party advisory |
http://twiki.org/cgi-bin/view/Codev/SecurityAlertCmdExecWithConfigure | patch exploit |
http://www.securityfocus.com/bid/19188 | vdb entry |
http://www.osvdb.org/displayvuln.php?osvdb_id=27556 | vdb entry |
http://www.vupen.com/english/advisories/2006/2995 | vdb entry |