[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108741

 
 

909

 
 

85475

 
 

134

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2008-0782Date: (C)2008-02-14   (M)2018-02-19


Directory traversal vulnerability in MoinMoin 1.5.8 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the MOIN_ID user ID in a cookie for a userform action. NOTE: this issue can be leveraged for PHP code execution via the quicklinks parameter.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 5.0
Exploit Score: Exploit Score: 10.0
Impact Score: Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: LOW
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: PARTIAL
Scope: Integrity: NONE
Confidentiality: Availability: NONE
Integrity:  
Availability:  
  
Reference:
http://www.attrition.org/pipermail/vim/2008-January/001890.html
BID-27404
SECUNIA-29010
SECUNIA-29262
SECUNIA-29444
SECUNIA-33755
EXPLOIT-DB-4957
ADV-2008-0569
DSA-1514
GLSA-200803-27
USN-716-1
http://hg.moinmo.in/moin/1.5/rev/e69a16b6e630
moinmoin-readme-file-overwrite(39837)

CWE    1
CWE-22
OVAL    2
oval:org.mitre.oval:def:7891
oval:org.secpod.oval:def:700313

© SecPod Technologies