Summary: | <www-apps/moinmoin-1.9.6: Multiple vulnerabilities (CVE-2012-{6080,6081,6082,6495}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sean Amoss (RETIRED) <ackle> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | web-apps |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://moinmo.in/SecurityFixes | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Sean Amoss (RETIRED)
![]() ![]() 1.9.6 added to CVS. Feel free to stabilize it. (In reply to comment #1) > 1.9.6 added to CVS. Feel free to stabilize it. Thanks, Tim. Arches, please test and mark stable. amd64 stable x86 stable CVE-2012-6495 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6495): Multiple directory traversal vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to overwrite arbitrary files via unspecified vectors. NOTE: this can be leveraged with CVE-2012-6081 to execute arbitrary code. CVE-2012-6082 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6082): Cross-site scripting (XSS) vulnerability in the rsslink function in theme/__init__.py in MoinMoin 1.9.5 allows remote attackers to inject arbitrary web script or HTML via the page name in a rss link. CVE-2012-6081 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6081): Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, as exploited in the wild in July 2012. CVE-2012-6080 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6080): Directory traversal vulnerability in the _do_attachment_move function in the AttachFile action (action/AttachFile.py) in MoinMoin 1.9.3 through 1.9.5 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in a file name. ppc stable Filed a new GLSA request. This issue was resolved and addressed in GLSA 201309-14 at http://security.gentoo.org/glsa/glsa-201309-14.xml by GLSA coordinator Sean Amoss (ackle). |