Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-3195

Опубликовано: 18 сент. 2008
Источник: debian
EPSS Средний

Описание

Directory traversal vulnerability in bin/configure in TWiki before 4.2.3, when a certain step in the installation guide is skipped, allows remote attackers to read arbitrary files via a query string containing a .. (dot dot) in the image variable, and execute arbitrary files via unspecified vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
twikifixed1:4.1.2-5package

Примечания

  • access to configure script is restricted to localhost on Debian

EPSS

Процентиль: 98%
0.57505
Средний

Связанные уязвимости

ubuntu
больше 17 лет назад

Directory traversal vulnerability in bin/configure in TWiki before 4.2.3, when a certain step in the installation guide is skipped, allows remote attackers to read arbitrary files via a query string containing a .. (dot dot) in the image variable, and execute arbitrary files via unspecified vectors.

nvd
больше 17 лет назад

Directory traversal vulnerability in bin/configure in TWiki before 4.2.3, when a certain step in the installation guide is skipped, allows remote attackers to read arbitrary files via a query string containing a .. (dot dot) in the image variable, and execute arbitrary files via unspecified vectors.

github
почти 4 года назад

Directory traversal vulnerability in bin/configure in TWiki before 4.2.3, when a certain step in the installation guide is skipped, allows remote attackers to read arbitrary files via a query string containing a .. (dot dot) in the image variable, and execute arbitrary files via unspecified vectors.

EPSS

Процентиль: 98%
0.57505
Средний