CVE-2014-7237

lib/TWiki/Sandbox.pm in TWiki 6.0.0 and earlier, when running on Windows, allows remote attackers to bypass intended access restrictions and upload files with restricted names via a null byte (%00) in a filename to bin/upload.cgi, as demonstrated using .htaccess to execute arbitrary code.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:twiki:twiki:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:16

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2014/Oct/45 - Exploit () http://seclists.org/fulldisclosure/2014/Oct/45 - Exploit
References () http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2014-7237 - Exploit () http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2014-7237 - Exploit
References () http://www.securitytracker.com/id/1030982 - Exploit () http://www.securitytracker.com/id/1030982 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/96952 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/96952 -

Information

Published : 2014-10-16 00:55

Updated : 2024-11-21 02:16


NVD link : CVE-2014-7237

Mitre link : CVE-2014-7237

CVE.ORG link : CVE-2014-7237


JSON object : View

Products Affected

twiki

  • twiki

microsoft

  • windows
CWE
CWE-264

Permissions, Privileges, and Access Controls