Directory traversal vulnerability in bin/configure in TWiki before 4.2.3, when a certain step in the installation guide is skipped, allows remote attackers to read arbitrary files via a query string containing a .. (dot dot) in the image variable, and execute arbitrary files via unspecified vectors.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation22 reference(s) from NVD