Vulnerability Details : CVE-2005-2877
Public exploit exists!
The history (revision control) function in TWiki 02-Sep-2004 and earlier allows remote attackers to execute arbitrary code via shell metacharacters, as demonstrated via the rev parameter to TWikiUsers.
Vulnerability category: Execute code
Products affected by CVE-2005-2877
- cpe:2.3:a:twiki:twiki:2003-02-01:*:*:*:*:*:*:*
- cpe:2.3:a:twiki:twiki:2004-09-01:*:*:*:*:*:*:*
- cpe:2.3:a:twiki:twiki:2004-09-02:*:*:*:*:*:*:*
- cpe:2.3:a:twiki:twiki:2000-12-01:*:*:*:*:*:*:*
- cpe:2.3:a:twiki:twiki:2001-12-01:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-2877
81.67%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2005-2877
-
TWiki History TWikiUsers rev Parameter Command Execution
Disclosure Date: 2005-09-14First seen: 2020-04-26exploit/unix/webapp/twiki_historyThis module exploits a vulnerability in the history component of TWiki. By passing a 'rev' parameter containing shell metacharacters to the TWikiUsers script, an attacker can execute arbitrary OS commands. Authors: - B4dP4nd4 - jduck <jduck@metasploit.com>
CVSS scores for CVE-2005-2877
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2005-2877
-
http://www.kb.cert.org/vuls/id/757181
Patch;Third Party Advisory;US Government Resource
-
http://marc.info/?l=bugtraq&m=112680475417550&w=2
-
http://www.securityfocus.com/bid/14834
TWiki TWikiUsers Remote Arbitrary Command Execution VulnerabilityExploit;Patch
-
http://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithRev
SecurityAlertExecuteCommandsWithRev < Codev < TWikiPatch;Vendor Advisory
Jump to