TWiki bin/configure 'image' Parameter Traversal Arbitrary File Access/Execution

Medium Nessus Plugin ID 34031


The remote web server hosts a CGI script that is affected by multiple vulnerabilities.


The version of TWiki running on the remote host allows access to the 'configure' script, and fails to sanitize the 'image' parameter of that script. When the 'action' parameter is set to 'image', an unauthenticated attacker can exploit this issue to execute arbitrary code or to view arbitrary files on the remote host subject to the privileges of the web server user id.

Note that the TWiki Installation Guide says the 'configure' script should never be left open to the public.


Configure the web server to limit access to 'configure', either based on IP address or a specific user, according to the TWiki Installation Guide referenced above. Upgrades and hotfixes are also available from the vendor advisory listed above.

See Also

Plugin Details

Severity: Medium

ID: 34031

File Name: twiki_image_dir_traversal.nasl

Version: 1.18

Type: remote

Family: CGI abuses

Published: 2008/08/23

Updated: 2018/08/15

Dependencies: 19941

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3.0

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:twiki:twiki

Required KB Items: installed_sw/TWiki

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2008/09/12

Vulnerability Publication Date: 2008/09/20

Reference Information

CVE: CVE-2008-3195

EDB-ID: 6269, 6509

CWE: 22