Cross-site request forgery (CSRF) vulnerability in TWiki before 4.3.2 allows remote attackers to hijack the authentication of arbitrary users for requests that update pages, as demonstrated by a URL for a save script in the ACTION attribute of a FORM element, in conjunction with a call to the submit method in the onload attribute of a BODY element. NOTE: this issue exists because of an insufficient fix for CVE-2009-1339.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Twiki | Twiki | * | 4.3.1 (including) |
Twiki | Twiki | 4.0.0 (including) | 4.0.0 (including) |
Twiki | Twiki | 4.0.1 (including) | 4.0.1 (including) |
Twiki | Twiki | 4.0.2 (including) | 4.0.2 (including) |
Twiki | Twiki | 4.0.3 (including) | 4.0.3 (including) |
Twiki | Twiki | 4.0.4 (including) | 4.0.4 (including) |
Twiki | Twiki | 4.0.5 (including) | 4.0.5 (including) |
Twiki | Twiki | 4.1.0 (including) | 4.1.0 (including) |
Twiki | Twiki | 4.1.1 (including) | 4.1.1 (including) |
Twiki | Twiki | 4.1.2 (including) | 4.1.2 (including) |
Twiki | Twiki | 4.2.0 (including) | 4.2.0 (including) |
Twiki | Twiki | 4.2.1 (including) | 4.2.1 (including) |
Twiki | Twiki | 4.2.2 (including) | 4.2.2 (including) |
Twiki | Twiki | 4.2.3 (including) | 4.2.3 (including) |
Twiki | Twiki | 4.2.4 (including) | 4.2.4 (including) |
Twiki | Twiki | 4.3.0 (including) | 4.3.0 (including) |
Twiki | Ubuntu | dapper | * |
Twiki | Ubuntu | hardy | * |
Twiki | Ubuntu | jaunty | * |
Twiki | Ubuntu | karmic | * |
Twiki | Ubuntu | upstream | * |