[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-0782Date: (C)2008-02-14   (M)2023-12-22


Directory traversal vulnerability in MoinMoin 1.5.8 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the MOIN_ID user ID in a cookie for a userform action. NOTE: this issue can be leveraged for PHP code execution via the quicklinks parameter.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
http://www.attrition.org/pipermail/vim/2008-January/001890.html
BID-27404
SECUNIA-29010
SECUNIA-29262
SECUNIA-29444
SECUNIA-33755
EXPLOIT-DB-4957
ADV-2008-0569
DSA-1514
GLSA-200803-27
USN-716-1
http://hg.moinmo.in/moin/1.5/rev/e69a16b6e630
moinmoin-readme-file-overwrite(39837)

CWE    1
CWE-22
OVAL    2
oval:org.mitre.oval:def:7891
oval:org.secpod.oval:def:700313

© SecPod Technologies