6.4
CVSSv2

CVE-2012-6080

Published: 03/01/2013 Updated: 03/01/2013
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

Directory traversal vulnerability in the _do_attachment_move function in the AttachFile action (action/AttachFile.py) in MoinMoin 1.9.3 up to and including 1.9.5 allows remote malicious users to overwrite arbitrary files via a .. (dot dot) in a file name.

Vulnerable Product Search on Vulmon Subscribe to Product

moinmo moinmoin 1.9.3

moinmo moinmoin 1.9.4

moinmo moinmoin 1.9.5

Vendor Advisories

Debian Bug report logs - #696949 [CVE-2012-6080] moin: path traversal vulnerability Package: moin; Maintainer for moin is Steve McIntyre <93sam@debianorg>; Reported by: Henri Salo <henri@nervfi> Date: Sat, 29 Dec 2012 19:27:05 UTC Severity: important Tags: security Found in version 195-2 Fixed in version 195-4 ...
It was discovered that missing input validation in the twikidraw and anywikidraw actions can result in the execution of arbitrary code This security issue is being actively exploited This update also addresses path traversal in AttachFile For the stable distribution (squeeze), this problem has been fixed in version 193-1+squeeze4 For the unst ...