Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6766-r2rx-mfw9

Опубликовано: 01 мая 2022
Источник: github
Github: Прошло ревью

Описание

MoinMoin Directory traversal vulnerability

Directory traversal vulnerability in MoinMoin 1.5.8 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the MOIN_ID user ID in a cookie for a userform action. NOTE: this issue can be leveraged for PHP code execution via the quicklinks parameter. The issue has been fixed on e69a16b6e630.

Пакеты

Наименование

moin

pip
Затронутые версииВерсия исправления

<= 1.5.8

Отсутствует

EPSS

Процентиль: 93%
0.10927
Средний

Дефекты

CWE-22

Связанные уязвимости

ubuntu
почти 18 лет назад

Directory traversal vulnerability in MoinMoin 1.5.8 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the MOIN_ID user ID in a cookie for a userform action. NOTE: this issue can be leveraged for PHP code execution via the quicklinks parameter.

redhat
почти 18 лет назад

Directory traversal vulnerability in MoinMoin 1.5.8 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the MOIN_ID user ID in a cookie for a userform action. NOTE: this issue can be leveraged for PHP code execution via the quicklinks parameter.

nvd
почти 18 лет назад

Directory traversal vulnerability in MoinMoin 1.5.8 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the MOIN_ID user ID in a cookie for a userform action. NOTE: this issue can be leveraged for PHP code execution via the quicklinks parameter.

debian
почти 18 лет назад

Directory traversal vulnerability in MoinMoin 1.5.8 and earlier allows ...

EPSS

Процентиль: 93%
0.10927
Средний

Дефекты

CWE-22