The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2446-1 | moin security update |
![]() |
DSA-4787-1 | moin security update |
![]() |
GHSA-52q8-877j-gghq | MoinMoin vulnerable to remote code execution via cache action |
![]() |
USN-4629-1 | MoinMoin vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T15:26:09.287Z
Reserved: 2020-09-02T00:00:00
Link: CVE-2020-25074

No data.

Status : Modified
Published: 2020-11-10T17:15:12.907
Modified: 2024-11-21T05:17:12.670
Link: CVE-2020-25074

No data.

No data.