TWiki < 5.1.3 Multiple Vulnerabilities

high Nessus Plugin ID 63399

Synopsis

The remote web server contains a CGI application that is affected by multiple vulnerabilities.

Description

According to its version number, the instance of TWiki running on the remote host is affected by multiple security vulnerabilities :

- The '%MAKETEXT{}%' variable fails to properly sanitize user-supplied input. A remote attacker can exploit this issue to execute arbitrary shell commands on the remote host subject to the privileges of the web server user.
(CVE-2012-6329)

- The '%MAKETEXT{}%' variable fails to properly sanitize user-supplied input, which can lead to a denial of service) condition if an overly large value is passed to the variable. (CVE-2012-6330)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to TWiki version 5.1.3 or later. Alternatively, apply the hotfix referenced in the vendor advisory.

See Also

http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2012-6329

Plugin Details

Severity: High

ID: 63399

File Name: twiki_5_1_3.nasl

Version: 1.28

Type: remote

Family: CGI abuses

Published: 1/7/2013

Updated: 4/11/2022

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:twiki:twiki

Required KB Items: Settings/ParanoidReport, installed_sw/TWiki

Exploit Available: true

Exploit Ease: No exploit is required

Patch Publication Date: 12/16/2012

Vulnerability Publication Date: 12/12/2012

Exploitable With

Metasploit (TWiki MAKETEXT Remote Command Execution)

Elliot (Foswiki 1.1.5 RCE)

Reference Information

CVE: CVE-2012-6329, CVE-2012-6330

BID: 56950