This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.
The remote web server includes a CGI script that is affected by
The version of TWiki installed on the remote host allows access to the
'configure' script and fails to sanitize the 'image' parameter of that
script. When the 'action' parameter is set to 'image', an
unauthenticated attacker can leverage this issue to execute arbitrary
code or to view arbitrary files on the remote host subject to the
privileges of the web server user id.
Note that the TWiki Installation Guide says the 'configure' script
should never be left open to the public.
See also :
Configure the web server to limit access to 'configure', either based
on IP address or a specific user, according to the TWiki Installation
Guide referenced above. Upgrades and hotfixes are also available from
the vendor advisory listed above.
Risk factor :
Medium / CVSS Base Score : 6.8
Public Exploit Available : true
Family: CGI abuses
Nessus Plugin ID: 34031 ()
CVE ID: CVE-2008-3195