Vulnerabilities > CVE-2006-4294 - Directory Traversal vulnerability in TWiki Viewfile

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
twiki
nessus
exploit available

Summary

Directory traversal vulnerability in viewfile in TWiki 4.0.0 through 4.0.4 allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter.

Vulnerable Configurations

Part Description Count
Application
Twiki
5

Exploit-Db

descriptionTWiki 4.0.x Viewfile Directory Traversal Vulnerability. CVE-2006-4294. Webapps exploit for php platform
idEDB-ID:28495
last seen2016-02-03
modified2006-09-07
published2006-09-07
reporterPeter Thoeny
sourcehttps://www.exploit-db.com/download/28495/
titleTWiki 4.0.x Viewfile Directory Traversal Vulnerability

Nessus

NASL familyCGI abuses
NASL idTWIKI_FILENAME_DIR_TRAVERSAL.NASL
descriptionThe version of TWiki running on the remote host allows directory traversal sequences in the
last seen2020-06-01
modified2020-06-02
plugin id22362
published2006-09-15
reporterThis script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/22362
titleTWiki 'filename' Parameter Traversal Arbitrary File Access