CVE-2012-6495
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
03/01/2013
Last modified:
11/04/2025
Description
Multiple directory traversal vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to overwrite arbitrary files via unspecified vectors. NOTE: this can be leveraged with CVE-2012-6081 to execute arbitrary code.
Impact
Base Score 2.0
6.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:moinmo:moinmoin:*:*:*:*:*:*:*:* | 1.9.5 (including) | |
| cpe:2.3:a:moinmo:moinmoin:0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:0.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:0.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:0.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:0.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:1.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://hg.moinmo.in/moin/1.9/rev/7e7e1cbb9d3f
- http://moinmo.in/MoinMoinRelease1.9
- http://moinmo.in/SecurityFixes
- http://secunia.com/advisories/51696
- http://ubuntu.com/usn/usn-1680-1
- http://www.debian.org/security/2012/dsa-2593
- http://www.openwall.com/lists/oss-security/2012/12/29/6
- http://www.openwall.com/lists/oss-security/2012/12/30/4
- https://bugs.launchpad.net/ubuntu/+source/moin/+bug/1094599
- http://hg.moinmo.in/moin/1.9/rev/7e7e1cbb9d3f
- http://moinmo.in/MoinMoinRelease1.9
- http://moinmo.in/SecurityFixes
- http://secunia.com/advisories/51696
- http://ubuntu.com/usn/usn-1680-1
- http://www.debian.org/security/2012/dsa-2593
- http://www.openwall.com/lists/oss-security/2012/12/29/6
- http://www.openwall.com/lists/oss-security/2012/12/30/4
- https://bugs.launchpad.net/ubuntu/+source/moin/+bug/1094599



