Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-7236 PoC — TWiki 注入漏洞

Source
Associated Vulnerability
Title:TWiki 注入漏洞 (CVE-2014-7236)
Description:TWiki是美国Peter Thoeny软件开发者的一套基于Perl语言的开源Wiki程序,是一个基于Web的网站协作平台,它可用于项目开发管理、文档管理、知识库管理以及其他协作工作。 TWiki 6.0.1之前版本中的lib/TWiki/Plugins.pm文件存在注入漏洞。该漏洞源于用户输入构造命令、数据结构或记录的操作过程中,网络系统或产品缺乏对用户输入数据的正确验证,未过滤或未正确过滤掉其中的特殊元素,导致系统或产品产生解析或解释方式错误。
Description
Exploit for CVE-2014-7236
Readme
Exploit for TWiki code execution CVE-2014-7236

usage: perl exploit.pl host [cmd]

ex. perl exploit.pl http://127.0.0.1/Main/WebHome "uname -a"

Reference:
http://seclists.org/fulldisclosure/2014/Oct/44
File Snapshot

[4.0K] /data/pocs/e0ac0f4929ef7c0e0583a5b669edc5b098b39646 ├── [ 989] exploit.pl └── [ 203] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.