Name | moinmoin_rce |
---|---|
CVE | CVE-2012-6495 Exploit Pack |
VENDOR: http://moinmoi.in | |
NOTES: | |
This version of the exploit forces a callback by overwriting moin.wsgi. This makes it a one-shot exploit, and if | |
it fails, will result in the remote MoinMoin install being corrupt. Make sure you set your callback IP address | |
appropriately. Manually refreshing your browser may open up new listener shells even after the exploit has been run. |
Repeatability: One-shot
CVE URL: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6495
CVSS: 6