CVE-2008-5305

Eval injection vulnerability in TWiki before 4.2.4 allows remote attackers to execute arbitrary Perl code via the %SEARCH{}% variable.
Configurations

Configuration 1

cpe:2.3:a:twiki:twiki:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:twiki:twiki:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:twiki:twiki:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:twiki:twiki:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:twiki:twiki:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:twiki:twiki:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:twiki:twiki:*:*:*:*:*:*:*:*
cpe:2.3:a:twiki:twiki:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:twiki:twiki:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:twiki:twiki:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:twiki:twiki:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:twiki:twiki:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:twiki:twiki:4.1.2:*:*:*:*:*:*:*

Information

Published : 2008-12-10 12:30

Updated : 2009-03-03 07:00


NVD link : CVE-2008-5305

Mitre link : CVE-2008-5305

Products Affected
No products.
CWE
CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')