postinst in twiki 4.1.2 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/twiki temporary file. NOTE: the vendor disputes this vulnerability, stating this bug is invalid.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Twiki | Twiki | 4.1.2 (including) | 4.1.2 (including) |
Twiki | Ubuntu | dapper | * |
Twiki | Ubuntu | gutsy | * |
Twiki | Ubuntu | hardy | * |
Twiki | Ubuntu | intrepid | * |
Twiki | Ubuntu | upstream | * |