TWiki bin/configure 'image' Parameter Traversal Arbitrary File Access/Execution
Medium Nessus Plugin ID 34031
SynopsisThe remote web server hosts a CGI script that is affected by multiple vulnerabilities.
DescriptionThe version of TWiki running on the remote host allows access to the 'configure' script, and fails to sanitize the 'image' parameter of that script. When the 'action' parameter is set to 'image', an unauthenticated attacker can exploit this issue to execute arbitrary code or to view arbitrary files on the remote host subject to the privileges of the web server user id.
Note that the TWiki Installation Guide says the 'configure' script should never be left open to the public.
SolutionConfigure the web server to limit access to 'configure', either based on IP address or a specific user, according to the TWiki Installation Guide referenced above. Upgrades and hotfixes are also available from the vendor advisory listed above.