Directory traversal vulnerability in the _do_attachment_move function in the AttachFile action (action/AttachFile.py) in MoinMoin 1.9.3 through 1.9.5 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in a file name.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://hg.moinmo.in/moin/1.9/rev/3c27131a3c52 - Patch | |
References | () http://moinmo.in/SecurityFixes - Vendor Advisory | |
References | () http://secunia.com/advisories/51663 - Vendor Advisory | |
References | () http://secunia.com/advisories/51676 - Vendor Advisory | |
References | () http://secunia.com/advisories/51696 - Vendor Advisory | |
References | () http://ubuntu.com/usn/usn-1680-1 - | |
References | () http://www.debian.org/security/2012/dsa-2593 - | |
References | () http://www.openwall.com/lists/oss-security/2012/12/30/6 - | |
References | () http://www.securityfocus.com/bid/57076 - | |
References | () https://bugs.launchpad.net/ubuntu/+source/moin/+bug/1094599 - |
Information
Published : 2013-01-03 01:55
Updated : 2024-11-21 01:45
NVD link : CVE-2012-6080
Mitre link : CVE-2012-6080
CVE.ORG link : CVE-2012-6080
JSON object : View
Products Affected
moinmo
- moinmoin
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')