Eval injection vulnerability in lib/TWiki/Plugins.pm in TWiki before 6.0.1 allows remote attackers to execute arbitrary Perl code via the debugenableplugins parameter to do/view/Main/WebHome.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/70372 | third party advisory vdb entry |
http://packetstormsecurity.com/files/128623/Twiki-Perl-Code-Execution.html | third party advisory vdb entry exploit |
http://seclists.org/fulldisclosure/2014/Oct/44 | mailing list third party advisory exploit |
http://www.securitytracker.com/id/1030981 | third party advisory vdb entry |