Lucene search

K
gentooGentoo FoundationGLSA-200411-33
HistoryNov 24, 2004 - 12:00 a.m.

TWiki: Arbitrary command execution

2004-11-2400:00:00
Gentoo Foundation
security.gentoo.org
11

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.914

Percentile

98.9%

Background

TWiki is a Web-based groupware tool based around the concept of wiki pages that can be edited by anybody with a Web browser.

Description

The TWiki search function, which uses a shell command executed via the Perl backtick operator, does not properly escape shell metacharacters in the user-provided search string.

Impact

An attacker can insert malicious commands into a search request, allowing the execution of arbitrary commands with the privileges of the user running TWiki (usually the Web server user).

Workaround

There is no known workaround at this time.

Resolution

All TWiki users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-apps/twiki-20040902"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-apps/twiki< 20040902UNKNOWN

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.914

Percentile

98.9%