Vulnerabilities > CVE-2006-4294 - Directory Traversal vulnerability in TWiki Viewfile
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
Directory traversal vulnerability in viewfile in TWiki 4.0.0 through 4.0.4 allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 |
Exploit-Db
description | TWiki 4.0.x Viewfile Directory Traversal Vulnerability. CVE-2006-4294. Webapps exploit for php platform |
id | EDB-ID:28495 |
last seen | 2016-02-03 |
modified | 2006-09-07 |
published | 2006-09-07 |
reporter | Peter Thoeny |
source | https://www.exploit-db.com/download/28495/ |
title | TWiki 4.0.x Viewfile Directory Traversal Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | TWIKI_FILENAME_DIR_TRAVERSAL.NASL |
description | The version of TWiki running on the remote host allows directory traversal sequences in the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22362 |
published | 2006-09-15 |
reporter | This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/22362 |
title | TWiki 'filename' Parameter Traversal Arbitrary File Access |