First published: Thu Jul 27 2006(Updated: )
Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Twiki Twiki | =4.0.1 | |
Twiki Twiki | =4.0.3 | |
Twiki Twiki | =4.0.4 | |
Twiki Twiki | =4.0 | |
Twiki Twiki | =4.0.0 | |
Twiki Twiki | =4.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3819 is considered a critical vulnerability due to its ability to allow remote code execution.
To mitigate CVE-2006-3819, upgrade to TWiki version 4.0.5 or later, where the vulnerability is patched.
CVE-2006-3819 affects TWiki versions 4.0.0 through 4.0.4.
Any remote attacker with access to send an HTTP POST request can exploit CVE-2006-3819.
CVE-2006-3819 is an eval injection vulnerability that allows execution of arbitrary Perl code.