Lucene search

K

MoinMoin Multiple Vulnerabilities

πŸ—“οΈΒ 21 Mar 2013Β 00:00:00Reported byΒ Copyright (C) 2013 Greenbone AGTypeΒ 
openvas
Β openvas
πŸ”—Β plugins.openvas.orgπŸ‘Β 71Β Views

MoinMoin Multiple Vulnerabilities, prone to multiple vulnerabilities, allowing remote attackers to execute arbitrary HTML or web script, upload malicious script, and overwrite arbitrary files via directory traversal sequences

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
OpenVAS
Debian: Security Advisory (DSA-2593-1)
18 Sep 201300:00
–openvas
OpenVAS
Debian Security Advisory DSA 2593-1 (moin - several vulnerabilities)
18 Sep 201300:00
–openvas
OpenVAS
Fedora Update for moin FEDORA-2013-0600
21 Jan 201300:00
–openvas
OpenVAS
Fedora Update for moin FEDORA-2013-0600
21 Jan 201300:00
–openvas
OpenVAS
Gentoo Security Advisory GLSA 201309-14
29 Sep 201500:00
–openvas
OpenVAS
Fedora Update for moin FEDORA-2013-0640
24 Jan 201300:00
–openvas
OpenVAS
Fedora Update for moin FEDORA-2013-0640
24 Jan 201300:00
–openvas
OpenVAS
Fedora Update for moin FEDORA-2013-0685
24 Jan 201300:00
–openvas
OpenVAS
Fedora Update for moin FEDORA-2013-0685
24 Jan 201300:00
–openvas
Gentoo Linux
MoinMoin: Multiple vulnerabilities
24 Sep 201300:00
–gentoo
Rows per page
# SPDX-FileCopyrightText: 2013 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:moinmo:moinmoin";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.803445");
  script_version("2023-10-27T05:05:28+0000");
  script_cve_id("CVE-2012-6080", "CVE-2012-6081", "CVE-2012-6082", "CVE-2012-6495");
  script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:P/A:P");
  script_tag(name:"last_modification", value:"2023-10-27 05:05:28 +0000 (Fri, 27 Oct 2023)");
  script_tag(name:"creation_date", value:"2013-03-21 15:03:34 +0530 (Thu, 21 Mar 2013)");
  script_name("MoinMoin Multiple Vulnerabilities");
  script_category(ACT_ATTACK);
  script_copyright("Copyright (C) 2013 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("gb_moinmoin_wiki_detect.nasl");
  script_require_ports("Services/www", 8080);
  script_mandatory_keys("moinmoinWiki/installed");

  script_xref(name:"URL", value:"http://moinmo.in/SecurityFixes");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/57076");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/57082");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/57089");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/57147");
  script_xref(name:"URL", value:"http://secunia.com/advisories/51663");
  script_xref(name:"URL", value:"http://www.openwall.com/lists/oss-security/2012/12/29/6");
  script_xref(name:"URL", value:"http://www.openwall.com/lists/oss-security/2012/12/30/6");

  script_tag(name:"impact", value:"Successful exploitation will allow remote attackers to execute arbitrary
  HTML or web script in a user's browser session in the context of an affected
  site, upload malicious script and overwrite arbitrary files via directory
  traversal sequences.");

  script_tag(name:"affected", value:"MoinMoin version 1.9.x prior to 1.9.6.");

  script_tag(name:"insight", value:"Multiple flaws due to:

  - Certain input when handling the AttachFile action is not properly verified
    before being used to write files.

  - The application allows the upload of files with arbitrary extensions to a
    folder inside the webroot when handling the twikidraw or anywikidraw
    actions.

  - Input passed via page name in rss link is not properly sanitised before
    being displayed to the user.");

  script_tag(name:"solution", value:"Update to MoinMoin 1.9.6 or later.");

  script_tag(name:"summary", value:"MoinMoin is prone to multiple vulnerabilities.");

  script_tag(name:"qod_type", value:"remote_analysis");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("http_func.inc");
include("host_details.inc");
include("http_keepalive.inc");

if( ! port = get_app_port( cpe:CPE ) ) exit( 0 );
if( ! dir = get_app_location( port:port, cpe:CPE ) ) exit( 0 );

if( dir == "/" ) dir = "";
url = dir + 'MoinMoin/theme/__init__.py/"<script>alert(document.cookie)</script>';

if( http_vuln_check( port:port, url:url, pattern:"<script>alert\(document\.cookie\)</script>", check_header:TRUE ) ) {
  report = http_report_vuln_url( port:port, url:url );
  security_message( port:port, data:report );
  exit( 0 );
}

exit( 99 );

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo