Vulnerabilities > CVE-2005-2877 - Unspecified vulnerability in Twiki
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The history (revision control) function in TWiki 02-Sep-2004 and earlier allows remote attackers to execute arbitrary code via shell metacharacters, as demonstrated via the rev parameter to TWikiUsers.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 |
Exploit-Db
description TWiki History TWikiUsers rev Parameter Command Execution. CVE-2005-2877. Webapps exploit for php platform id EDB-ID:16892 last seen 2016-02-02 modified 2010-07-03 published 2010-07-03 reporter metasploit source https://www.exploit-db.com/download/16892/ title TWiki History TWikiUsers rev Parameter Command Execution description TWiki TWikiUsers INCLUDE Function Remote Arbitrary Command Execution Vulnerability. CVE-2005-2877. Webapps exploit for php platform id EDB-ID:26302 last seen 2016-02-03 modified 2005-09-28 published 2005-09-28 reporter JChristophFuchs source https://www.exploit-db.com/download/26302/ title TWiki TWikiUsers INCLUDE Function Remote Arbitrary Command Execution Vulnerability
Metasploit
description | This module exploits a vulnerability in the history component of TWiki. By passing a 'rev' parameter containing shell metacharacters to the TWikiUsers script, an attacker can execute arbitrary OS commands. |
id | MSF:EXPLOIT/UNIX/WEBAPP/TWIKI_HISTORY |
last seen | 2020-02-29 |
modified | 2017-07-24 |
published | 2010-02-21 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/unix/webapp/twiki_history.rb |
title | TWiki History TWikiUsers rev Parameter Command Execution |
Nessus
NASL family | CGI abuses |
NASL id | TWIKI_REV_CMD_EXEC.NASL |
description | The version of TWiki running on the remote host allows an attacker to manipulate input to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 19704 |
published | 2005-09-15 |
reporter | This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/19704 |
title | TWiki 'rev' Parameter Arbitrary Command Execution |
Packetstorm
data source | https://packetstormsecurity.com/files/download/86538/twiki_history.rb.txt |
id | PACKETSTORM:86538 |
last seen | 2016-12-05 |
published | 2010-02-23 |
reporter | B4dP4nd4 |
source | https://packetstormsecurity.com/files/86538/TWiki-History-TWikiUsers-rev-Parameter-Command-Execution.html |
title | TWiki History TWikiUsers rev Parameter Command Execution |
Saint
bid | 14834 |
description | TWiki revision control shell command injection |
id | web_prog_cgi_twikirev |
osvdb | 19403 |
title | twiki_rev |
type | remote |
References
- http://marc.info/?l=bugtraq&m=112680475417550&w=2
- http://marc.info/?l=bugtraq&m=112680475417550&w=2
- http://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithRev
- http://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithRev
- http://www.kb.cert.org/vuls/id/757181
- http://www.kb.cert.org/vuls/id/757181
- http://www.securityfocus.com/bid/14834
- http://www.securityfocus.com/bid/14834