Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2006-3819


Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".


Published

2006-07-27T01:04:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application twiki twiki 4.0 Yes
Application twiki twiki 4.0.0 Yes
Application twiki twiki 4.0.1 Yes
Application twiki twiki 4.0.2 Yes
Application twiki twiki 4.0.3 Yes
Application twiki twiki 4.0.4 Yes

References