Executive Summary
Summary | |
---|---|
Title | moin security update |
Informations | |||
---|---|---|---|
Name | DSA-2593 | First vendor Publication | 2012-12-29 |
Vendor | Debian | Last vendor Modification | 2012-12-29 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.4 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
It was discovered that missing input validation in the twikidraw and anywikidraw actions can result in the execution of arbitrary code. This security issue in being actively exploited. This update also addresses path traversal in AttachFile. For the stable distribution (squeeze), this problem has been fixed in version 1.9.3-1+squeeze4. For the unstable distribution (sid), this problem has been fixed in version 1.9.5-4. We recommend that you upgrade your moin packages. |
Original Source
Url : http://www.debian.org/security/2012/dsa-2593 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18060 | |||
Oval ID: | oval:org.mitre.oval:def:18060 | ||
Title: | DSA-2593-1 moin - several | ||
Description: | It was discovered that missing input validation in the twikidraw and anywikidraw actions can result in the execution of arbitrary code. This security issue is being actively exploited. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2593-1 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 CVE-2012-6495 | Version: | 7 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | moin |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2013-09-18 | Name : Debian Security Advisory DSA 2593-1 (moin - several vulnerabilities) File : nvt/deb_2593_1.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | MoinMoin arbitrary file upload attempt RuleID : 25286 - Revision : 4 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-09-25 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201309-14.nasl - Type : ACT_GATHER_INFO |
2013-02-28 | Name : A wiki application on the remote web server is affected by multiple vulnerabi... File : moinmoin_1_9_6.nasl - Type : ACT_GATHER_INFO |
2013-02-28 | Name : A wiki application on the remote web server is affected by a cross- site scri... File : moinmoin_rsslink_xss.nasl - Type : ACT_ATTACK |
2013-01-23 | Name : The remote Fedora host is missing a security update. File : fedora_2013-0640.nasl - Type : ACT_GATHER_INFO |
2013-01-23 | Name : The remote Fedora host is missing a security update. File : fedora_2013-0685.nasl - Type : ACT_GATHER_INFO |
2013-01-21 | Name : The remote Fedora host is missing a security update. File : fedora_2013-0600.nasl - Type : ACT_GATHER_INFO |
2013-01-21 | Name : A wiki application on the remote web server is affected by a code execution v... File : moinmoin_twikidraw_code_exec.nasl - Type : ACT_DESTRUCTIVE_ATTACK |
2013-01-07 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_a264b1b0572611e2948314dae938ec40.nasl - Type : ACT_GATHER_INFO |
2012-12-31 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2593.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:31:32 |
|
2013-09-20 17:21:20 |
|
2013-01-03 21:19:53 |
|
2013-01-03 13:21:24 |
|
2012-12-30 00:18:11 |
|