Vulnerabilities > CVE-2006-4294 - Unspecified vulnerability in Twiki
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Directory traversal vulnerability in viewfile in TWiki 4.0.0 through 4.0.4 allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 |
Exploit-Db
description | TWiki 4.0.x Viewfile Directory Traversal Vulnerability. CVE-2006-4294. Webapps exploit for php platform |
id | EDB-ID:28495 |
last seen | 2016-02-03 |
modified | 2006-09-07 |
published | 2006-09-07 |
reporter | Peter Thoeny |
source | https://www.exploit-db.com/download/28495/ |
title | TWiki 4.0.x Viewfile Directory Traversal Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | TWIKI_FILENAME_DIR_TRAVERSAL.NASL |
description | The version of TWiki running on the remote host allows directory traversal sequences in the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22362 |
published | 2006-09-15 |
reporter | This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/22362 |
title | TWiki 'filename' Parameter Traversal Arbitrary File Access |
References
- http://secunia.com/advisories/21829
- http://secunia.com/advisories/21829
- http://securitytracker.com/id?1016805
- http://securitytracker.com/id?1016805
- http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2006-4294
- http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2006-4294
- http://www.securityfocus.com/bid/19907
- http://www.securityfocus.com/bid/19907
- http://www.vupen.com/english/advisories/2006/3524
- http://www.vupen.com/english/advisories/2006/3524