The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution.
References
Link | Resource |
---|---|
https://www.debian.org/security/2020/dsa-4787 | Third Party Advisory |
https://github.com/moinwiki/moin-1.9/security/advisories/GHSA-52q8-877j-gghq | Third Party Advisory |
http://moinmo.in/SecurityFixes | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/11/msg00020.html | Mailing List Third Party Advisory |
Information
Published : 2020-11-10 09:15
Updated : 2020-11-24 09:20
NVD link : CVE-2020-25074
Mitre link : CVE-2020-25074
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
debian
- debian_linux
moinmo
- moinmoin