Vulnerability Name: | CCN-84106 | ||||||
Published: | 2013-05-07 | ||||||
Updated: | 2013-05-07 | ||||||
Summary: | MoinMoin could allow a remote attacker to execute arbitrary code on the system, caused by the improper validation of input by the moinmelt.py script. An attacker could exploit this vulnerability to inject and execute arbitrary code on the system. | ||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||
CVSS v2 Severity: | 6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.8 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:U/RC:UR)
| ||||||
Vulnerability Consequences: | Gain Access | ||||||
References: | Source: CCN Type: MoinMoin Web Site MoinMoin Source: XF Type: UNKNOWN moinmoin-moinmelt-command-execution(84106) Source: CCN Type: Packet Storm Security [05-07-2013] MoinMelt Arbitrary Command Execution Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [05-08-2013] | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |