CVE-2012-6081: MoinMoin Multiple unrestricted file upload vulnerabilities
6.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.98856%
CWE
Published
5/17/2022
Updated
9/26/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:F
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
moin | pip | < 1.9.6 | 1.9.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly identifies the twikidraw and anywikidraw actions (implemented in action/twikidraw.py
and action/anywikidraw.py
) as the source of unrestricted file uploads. The security fix commit (hg.moinmo.in/moin/1.9/rev/7e7e1cbb9d3f
) targets these components, and multiple references (including CVE-2012-6081 details) confirm the save()
methods in these classes failed to sanitize file paths/names, leading to arbitrary code execution. The exploit requires authenticated users with write permissions, aligning with the functions' role in handling file uploads.