Vulnerability Description
Eval injection vulnerability in TWiki before 4.2.4 allows remote attackers to execute arbitrary Perl code via the %SEARCH{}% variable.
CVSS Score
10.0
HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Twiki | Twiki | <= 4.2.3 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/33040Vendor Advisory
- http://securitytracker.com/id?1021352
- http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2008-5305Vendor Advisory
- http://www.securityfocus.com/bid/32668
- http://www.vupen.com/english/advisories/2008/3381
- http://secunia.com/advisories/33040Vendor Advisory
- http://securitytracker.com/id?1021352
- http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2008-5305Vendor Advisory
- http://www.securityfocus.com/bid/32668
- http://www.vupen.com/english/advisories/2008/3381
FAQ
What is CVE-2008-5305?
CVE-2008-5305 is a vulnerability with a CVSS score of 10.0 (HIGH). Eval injection vulnerability in TWiki before 4.2.4 allows remote attackers to execute arbitrary Perl code via the %SEARCH{}% variable.
How severe is CVE-2008-5305?
CVE-2008-5305 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-5305?
Check the references section above for vendor advisories and patch information. Affected products include: Twiki Twiki.