Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/21235 - | |
References | () http://securitytracker.com/id?1016603 - | |
References | () http://twiki.org/cgi-bin/view/Codev/SecurityAlertCmdExecWithConfigure - Exploit, Patch | |
References | () http://www.osvdb.org/displayvuln.php?osvdb_id=27556 - | |
References | () http://www.securityfocus.com/bid/19188 - | |
References | () http://www.vupen.com/english/advisories/2006/2995 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/28049 - |
Information
Published : 2006-07-27 01:04
Updated : 2024-11-21 00:14
NVD link : CVE-2006-3819
Mitre link : CVE-2006-3819
CVE.ORG link : CVE-2006-3819
JSON object : View
Products Affected
twiki
- twiki
CWE