Vulnerability Details : CVE-2012-6081
Public exploit exists!
Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, as exploited in the wild in July 2012.
Vulnerability category: Execute code
Products affected by CVE-2012-6081
- cpe:2.3:a:moinmo:moinmoin:*:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.0:beta5:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.3:rc2:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.0:beta6:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.5:rc1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.5a:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.3.5:rc1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.8:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.7:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.11:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.2:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.10:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.5:a:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.8.8:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.9.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-6081
76.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2012-6081
-
MoinMoin twikidraw Action Traversal File Upload
Disclosure Date: 2012-12-30First seen: 2020-04-26exploit/unix/webapp/moinmoin_twikidrawThis module exploits a vulnerability in MoinMoin 1.9.5. The vulnerability exists on the manage of the twikidraw actions, where a traversal path can be used in order to upload arbitrary files. Exploitation is achieved on Apached/mod_wsgi configurations by overwritin
CVSS scores for CVE-2012-6081
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.0
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:P |
6.8
|
6.4
|
NIST |
References for CVE-2012-6081
-
http://hg.moinmo.in/moin/1.9/rev/7e7e1cbb9d3f
moin/1.9: 7e7e1cbb9d3fExploit;Patch
-
http://www.exploit-db.com/exploits/25304
MoinMoin - Arbitrary Command Execution - PHP webapps Exploit
-
http://secunia.com/advisories/51676
Sign inVendor Advisory
-
http://moinmo.in/SecurityFixes
SecurityFixes - MoinMoinVendor Advisory
-
http://secunia.com/advisories/51663
Sign inVendor Advisory
-
http://www.openwall.com/lists/oss-security/2012/12/30/4
oss-security - Re: CVE request: MoinMoin Wiki (remote code execution vulnerability)
-
http://ubuntu.com/usn/usn-1680-1
USN-1680-1: MoinMoin vulnerabilities | Ubuntu security notices
-
http://www.securityfocus.com/bid/57082
MoinMoin CVE-2012-6081 Multiple Arbitrary Code Execution Vulnerabilities
-
http://www.debian.org/security/2012/dsa-2593
Debian -- Security Information -- DSA-2593-1 moin
-
https://bugs.launchpad.net/ubuntu/+source/moin/+bug/1094599
Bug #1094599 “Security issues in 1.9.5 and earlier” : Bugs : moin package : Ubuntu
-
http://secunia.com/advisories/51696
Sign inVendor Advisory
-
http://moinmo.in/MoinMoinRelease1.9
MoinMoinRelease1.9 - MoinMoin
-
http://www.openwall.com/lists/oss-security/2012/12/29/6
oss-security - CVE request: MoinMoin Wiki (remote code execution vulnerability)
Jump to