Description
Directory traversal vulnerability in MoinMoin 1.5.8 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the MOIN_ID user ID in a cookie for a userform action. NOTE: this issue can be leveraged for PHP code execution via the quicklinks parameter.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1514-1 | New moin packages fix several vulnerabilities |
Github GHSA |
GHSA-6766-r2rx-mfw9 | MoinMoin Directory traversal vulnerability |
Ubuntu USN |
USN-716-1 | MoinMoin vulnerabilities |
References
History
Wed, 28 May 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T07:54:23.406Z
Reserved: 2008-02-14T00:00:00.000Z
Link: CVE-2008-0782
No data.
Status : Deferred
Published: 2008-02-14T21:00:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-0782
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Github GHSA
Ubuntu USN