Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.61640
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1639-1)
Summary:The remote host is missing an update for the Debian 'twiki' package(s) announced via the DSA-1639-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'twiki' package(s) announced via the DSA-1639-1 advisory.

Vulnerability Insight:
It was discovered that twiki, a web based collaboration platform, didn't properly sanitize the image parameter in its configuration script. This could allow remote users to execute arbitrary commands upon the system, or read any files which were readable by the webserver user.

For the stable distribution (etch), this problem has been fixed in version 1:4.0.5-9.1etch1.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you upgrade your twiki package.

Affected Software/OS:
'twiki' package(s) on Debian 4.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-3195
CERT/CC vulnerability note: VU#362012
http://www.kb.cert.org/vuls/id/362012
https://www.exploit-db.com/exploits/6269
http://secunia.com/advisories/31849
http://secunia.com/advisories/31964
http://securityreason.com/securityalert/4265
http://www.vupen.com/english/advisories/2008/2586
XForce ISS Database: twiki-configure-directory-traversal(45182)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45182
XForce ISS Database: twiki-configure-image-command-execution(45183)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45183
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.