ID CVE-2005-2877
Summary The history (revision control) function in TWiki 02-Sep-2004 and earlier allows remote attackers to execute arbitrary code via shell metacharacters, as demonstrated via the rev parameter to TWikiUsers.
References
Vulnerable Configurations
  • cpe:2.3:a:twiki:twiki:2000-12-01
    cpe:2.3:a:twiki:twiki:2000-12-01
  • cpe:2.3:a:twiki:twiki:2001-12-01
    cpe:2.3:a:twiki:twiki:2001-12-01
  • cpe:2.3:a:twiki:twiki:2003-02-01
    cpe:2.3:a:twiki:twiki:2003-02-01
  • cpe:2.3:a:twiki:twiki:2004-09-01
    cpe:2.3:a:twiki:twiki:2004-09-01
  • cpe:2.3:a:twiki:twiki:2004-09-02
    cpe:2.3:a:twiki:twiki:2004-09-02
CVSS
Base: 7.5 (as of 16-09-2005 - 16:11)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
exploit-db via4
  • description TWiki TWikiUsers INCLUDE Function Remote Arbitrary Command Execution Vulnerability. CVE-2005-2877. Webapps exploit for php platform
    id EDB-ID:26302
    last seen 2016-02-03
    modified 2005-09-28
    published 2005-09-28
    reporter JChristophFuchs
    source https://www.exploit-db.com/download/26302/
    title TWiki TWikiUsers INCLUDE Function Remote Arbitrary Command Execution Vulnerability
  • description TWiki History TWikiUsers rev Parameter Command Execution. CVE-2005-2877. Webapps exploit for php platform
    id EDB-ID:16892
    last seen 2016-02-02
    modified 2010-07-03
    published 2010-07-03
    reporter metasploit
    source https://www.exploit-db.com/download/16892/
    title TWiki History TWikiUsers rev Parameter Command Execution
metasploit via4
description This module exploits a vulnerability in the history component of TWiki. By passing a 'rev' parameter containing shell metacharacters to the TWikiUsers script, an attacker can execute arbitrary OS commands.
id MSF:EXPLOIT/UNIX/WEBAPP/TWIKI_HISTORY
last seen 2018-09-01
modified 2017-07-24
published 2010-02-21
reliability Excellent
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/twiki_history.rb
title TWiki History TWikiUsers rev Parameter Command Execution
nessus via4
NASL family CGI abuses
NASL id TWIKI_REV_CMD_EXEC.NASL
description The version of TWiki running on the remote host allows an attacker to manipulate input to the 'rev' parameter in order to execute arbitrary shell commands on the remote host subject to the privileges of the web server user id.
last seen 2019-01-16
modified 2018-08-01
plugin id 19704
published 2005-09-15
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=19704
title TWiki 'rev' Parameter Arbitrary Command Execution
packetstorm via4
data source https://packetstormsecurity.com/files/download/86538/twiki_history.rb.txt
id PACKETSTORM:86538
last seen 2016-12-05
published 2010-02-23
reporter B4dP4nd4
source https://packetstormsecurity.com/files/86538/TWiki-History-TWikiUsers-rev-Parameter-Command-Execution.html
title TWiki History TWikiUsers rev Parameter Command Execution
refmap via4
bid 14834
bugtraq 20050914 TWiki Remote Command Execution Vulnerability
cert-vn VU#757181
confirm http://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithRev
saint via4
bid 14834
description TWiki revision control shell command injection
id web_prog_cgi_twikirev
osvdb 19403
title twiki_rev
type remote
Last major update 17-10-2016 - 23:31
Published 16-09-2005 - 16:03
Back to Top