Vulnerability Name: | CVE-2012-6080 (CCN-80899) | ||||||||||||
Assigned: | 2012-12-29 | ||||||||||||
Published: | 2012-12-29 | ||||||||||||
Updated: | 2013-01-03 | ||||||||||||
Summary: | Directory traversal vulnerability in the _do_attachment_move function in the AttachFile action (action/AttachFile.py) in MoinMoin 1.9.3 through 1.9.5 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in a file name. | ||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||||||
CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P) 4.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
| ||||||||||||
Vulnerability Type: | CWE-22 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2012-6080 Source: CONFIRM Type: Patch http://hg.moinmo.in/moin/1.9/rev/3c27131a3c52 Source: CCN Type: MoinMoin Web site MoinMoin Source: CONFIRM Type: Vendor Advisory http://moinmo.in/SecurityFixes Source: SECUNIA Type: Vendor Advisory 51663 Source: SECUNIA Type: Vendor Advisory 51676 Source: SECUNIA Type: Vendor Advisory 51696 Source: UBUNTU Type: UNKNOWN USN-1680-1 Source: DEBIAN Type: UNKNOWN DSA-2593 Source: DEBIAN Type: DSA-2593 moin -- several vulnerabilities Source: MLIST Type: UNKNOWN [oss-security] 20121229 Re: CVE request: MoinMoin Wiki (path traversal vulnerability) Source: BID Type: UNKNOWN 57076 Source: CCN Type: BID-57076 MoinMoin wiki CVE-2012-6080 Directory Traversal Vulnerability Source: MISC Type: UNKNOWN https://bugs.launchpad.net/ubuntu/+source/moin/+bug/1094599 Source: CCN Type: Red Hat Bugzilla Bug 890907 CVE-2012-6081 CVE-2012-6082 CVE-2012-6080 moin various flaws [epel-5] Source: XF Type: UNKNOWN moinmoin-attachfile-dir-traversal(80899) | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |