Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-52q8-877j-gghq

Опубликовано: 11 нояб. 2020
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 8.8

Описание

MoinMoin vulnerable to remote code execution via cache action

Impact

The cache action in action/cache.py allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution.

Patches

Users are strongly advised to upgrade to a patched version.

MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes.

Workarounds

It is not advised to work around this, but to upgrade MoinMoin to a patched version.

That said, a work around via disabling the cache or the AttachFile action might be possible.

Also, it is of course helpful if you give write permissions (which include uploading attachments) only to trusted users.

Credits

This vulnerability was discovered by Michael Chapman.

For more information

If you have any questions or comments about this advisory, email me at twaldmann@thinkmo.de.

Пакеты

Наименование

moin

pip
Затронутые версииВерсия исправления

< 1.9.11

1.9.11

EPSS

Процентиль: 94%
0.12807
Средний

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 5 лет назад

The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution.

CVSS3: 9.8
nvd
около 5 лет назад

The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution.

CVSS3: 9.8
debian
около 5 лет назад

The cache action in action/cache.py in MoinMoin through 1.9.10 allows ...

CVSS3: 9.8
fstec
больше 5 лет назад

Уязвимость компонента action/cache.py вики-платформа MoinMoin, связанная с некорректным ограничением имени пути к каталогу, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

suse-cvrf
около 5 лет назад

Security update for moinmoin-wiki

EPSS

Процентиль: 94%
0.12807
Средний

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-22