lib/TWiki/Sandbox.pm in TWiki 6.0.0 and earlier, when running on Windows, allows remote attackers to bypass intended access restrictions and upload files with restricted names via a null byte (%00) in a filename to bin/upload.cgi, as demonstrated using .htaccess to execute arbitrary code.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2014-7237 | exploit |
http://www.securitytracker.com/id/1030982 | vdb entry exploit |
http://seclists.org/fulldisclosure/2014/Oct/45 | exploit mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/96952 | vdb entry |