Description
The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2446-1 | moin security update |
Debian DSA |
DSA-4787-1 | moin security update |
Github GHSA |
GHSA-52q8-877j-gghq | MoinMoin vulnerable to remote code execution via cache action |
Ubuntu USN |
USN-4629-1 | MoinMoin vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T15:26:09.287Z
Reserved: 2020-09-02T00:00:00.000Z
Link: CVE-2020-25074
No data.
Status : Modified
Published: 2020-11-10T17:15:12.907
Modified: 2024-11-21T05:17:12.670
Link: CVE-2020-25074
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Github GHSA
Ubuntu USN