Vulnerabilities > CVE-2012-6330 - Numeric Errors vulnerability in multiple products

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
twiki
foswiki
CWE-189
nessus
exploit available
metasploit

Summary

The localization functionality in TWiki before 5.1.3, and Foswiki 1.0.x through 1.0.10 and 1.1.x through 1.1.6, allows remote attackers to cause a denial of service (memory consumption) via a large integer in a %MAKETEXT% macro.

Common Weakness Enumeration (CWE)

Exploit-Db

descriptionFoswiki MAKETEXT Remote Command Execution. CVE-2012-6329,CVE-2012-6330. Remote exploit for unix platform
idEDB-ID:23580
last seen2016-02-02
modified2012-12-23
published2012-12-23
reportermetasploit
sourcehttps://www.exploit-db.com/download/23580/
titleFoswiki MAKETEXT Remote Command Execution

Metasploit

descriptionThis module exploits a vulnerability in the MAKETEXT Foswiki variable. By using a specially crafted MAKETEXT, a malicious user can execute shell commands since the input is passed to the Perl "eval" command without first being sanitized. The problem is caused by an underlying security issue in the CPAN:Locale::Maketext module. Only Foswiki sites that have user interface localization enabled (UserInterfaceInternationalisation variable set) are vulnerable. If USERNAME and PASSWORD aren't provided, anonymous access will be tried. Also, if the FoswikiPage option isn't provided, the module will try to create a random page on the SandBox space. The modules has been tested successfully on Foswiki 1.1.5 as distributed with the official Foswiki-1.1.5-vmware image.
idMSF:EXPLOIT/UNIX/WEBAPP/FOSWIKI_MAKETEXT
last seen2020-05-01
modified2018-08-20
published2012-12-21
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/unix/webapp/foswiki_maketext.rb
titleFoswiki MAKETEXT Remote Command Execution

Nessus

NASL familyCGI abuses
NASL idTWIKI_5_1_3.NASL
descriptionAccording to its version number, the instance of TWiki running on the remote host is affected by multiple security vulnerabilities : - The
last seen2020-06-01
modified2020-06-02
plugin id63399
published2013-01-07
reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/63399
titleTWiki < 5.1.3 Multiple Vulnerabilities

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/119055/foswiki_maketext.rb.txt
idPACKETSTORM:119055
last seen2016-12-05
published2012-12-24
reporterjuan vazquez
sourcehttps://packetstormsecurity.com/files/119055/Foswiki-MAKETEXT-Remote-Command-Execution.html
titleFoswiki MAKETEXT Remote Command Execution

Seebug

bulletinFamilyexploit
descriptionNo description provided by source.
idSSV:77334
last seen2017-11-19
modified2014-07-01
published2014-07-01
reporterRoot
sourcehttps://www.seebug.org/vuldb/ssvid-77334
titleFoswiki MAKETEXT Remote Command Execution