Search for vulnerabilities
| Vulnerability ID | VCID-9ydr-a92r-judb |
| Aliases |
CVE-2012-6329
|
| Summary | Multiple vulnerabilities have been found in the Perl Locale-Maketext module, allowing remote attackers to inject and execute arbitrary Perl code. |
| Status | Published |
| Exploitability | 2.0 |
| Weighted Severity | 6.8 |
| Risk | 10.0 |
| Affected and Fixed Packages | Package Details |
| System | Score | Found at |
|---|---|---|
| epss | 0.81971 | https://api.first.org/data/v1/epss?cve=CVE-2012-6329 |
| epss | 0.81971 | https://api.first.org/data/v1/epss?cve=CVE-2012-6329 |
| epss | 0.81971 | https://api.first.org/data/v1/epss?cve=CVE-2012-6329 |
| epss | 0.81971 | https://api.first.org/data/v1/epss?cve=CVE-2012-6329 |
| epss | 0.81971 | https://api.first.org/data/v1/epss?cve=CVE-2012-6329 |
| epss | 0.81971 | https://api.first.org/data/v1/epss?cve=CVE-2012-6329 |
| epss | 0.81971 | https://api.first.org/data/v1/epss?cve=CVE-2012-6329 |
| epss | 0.81971 | https://api.first.org/data/v1/epss?cve=CVE-2012-6329 |
| cvssv2 | 7.5 | https://nvd.nist.gov/vuln/detail/CVE-2012-6329 |
| Data source | Metasploit |
|---|---|
| Description | This module exploits a vulnerability in the MAKETEXT Twiki variable. By using a specially crafted MAKETEXT, a malicious user can execute shell commands since user input is passed to the Perl "eval" command without first being sanitized. The problem is caused by an underlying security issue in the CPAN:Locale::Maketext module. This works in TWiki sites that have user interface localization enabled (UserInterfaceInternationalisation variable set). If USERNAME and PASSWORD aren't provided, anonymous access will be tried. Also, if the 'TwikiPage' option isn't provided, the module will try to create a random page on the SandBox space. The module has been tested successfully on TWiki 5.1.2 as distributed with the official TWiki-VM-5.1.2-1 virtual machine. Affected versions: - TWiki-5.1.0 <= TWiki-5.1.2 - TWiki-5.0.x - TWiki-4.3.x - TWiki-4.2.x - TWiki-4.1.x - TWiki-4.0.x |
| Note | Reliability: - unknown-reliability Stability: - unknown-stability SideEffects: - unknown-side-effects |
| Ransomware campaign use | Unknown |
| Source publication date | Dec. 15, 2012 |
| Platform | Unix |
| Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/unix/webapp/twiki_maketext.rb |
| Data source | Exploit-DB |
|---|---|
| Date added | Dec. 23, 2012 |
| Description | TWiki MAKETEXT - Remote Command Execution (Metasploit) |
| Ransomware campaign use | Known |
| Source publication date | Dec. 23, 2012 |
| Exploit type | remote |
| Platform | unix |
| Source update date | Dec. 23, 2012 |
| Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
| Percentile | 0.99197 |
| EPSS Score | 0.81971 |
| Published At | April 1, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T13:01:17.906619+00:00 | Gentoo Importer | Import | https://security.gentoo.org/glsa/201410-02 | 38.0.0 |