CVE-2008-3195

Publication date 18 September 2008

Last updated 24 July 2024


Ubuntu priority

Directory traversal vulnerability in bin/configure in TWiki before 4.2.3, when a certain step in the installation guide is skipped, allows remote attackers to read arbitrary files via a query string containing a .. (dot dot) in the image variable, and execute arbitrary files via unspecified vectors.

Read the notes from the security team

Status

No maintained releases are affected by this CVE.

Package Ubuntu Release Status
twiki 11.10 oneiric Not in release
11.04 natty Not in release
10.10 maverick Not in release
10.04 LTS lucid Not in release
9.10 karmic
Not affected
9.04 jaunty
Not affected
8.10 intrepid Ignored end of life, was needed
8.04 LTS hardy Ignored end of life
7.10 gutsy Ignored end of life, was needed
7.04 feisty Ignored end of life, was needed
6.06 LTS dapper Ignored end of life

Notes


jdstrand

per Debian, access to configure script is restricted to localhost on Debian