Overview
TWiki fails to protect the CGI session directory, which may allow an attacker to execute arbitrary code with the privileges of the web server.
Description
TWiki is a web-based collaborative publishing environment. TWiki creates CGI session files in the global /tmp directory, which is generally world readable and writable. By creating CGI session files in this directory, an attacker may be able to execute arbitrary code. |
Impact
An attacker with the ability to create files in the CGI session directory (usually /tmp) may be able to execute arbitrary code with the privileges of the web server. |
Solution
Apply an update This issue is addressed in TWikiRelease04x01x01, as specified in TWiki SecurityAlert-CVE-2007-0669. |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Peter Thoeny for reporting this vulnerability.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2007-0669 |
Severity Metric: | 5.91 |
Date Public: | 2007-02-08 |
Date First Published: | 2007-02-08 |
Date Last Updated: | 2007-02-14 16:56 UTC |
Document Revision: | 7 |