{"id":"PYSEC-2013-5","details":"Directory traversal vulnerability in the _do_attachment_move function in the AttachFile action (action/AttachFile.py) in MoinMoin 1.9.3 through 1.9.5 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in a file name.","aliases":["CVE-2012-6080","GHSA-v33q-2xcj-4f3m"],"modified":"2024-05-01T11:11:39.197261Z","published":"2013-01-03T01:55:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/51663"},{"type":"ADVISORY","url":"http://secunia.com/advisories/51696"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2012/12/30/6"},{"type":"WEB","url":"http://www.securityfocus.com/bid/57076"},{"type":"WEB","url":"http://moinmo.in/SecurityFixes"},{"type":"ADVISORY","url":"http://www.debian.org/security/2012/dsa-2593"},{"type":"WEB","url":"http://hg.moinmo.in/moin/1.9/rev/3c27131a3c52"},{"type":"WEB","url":"https://bugs.launchpad.net/ubuntu/+source/moin/+bug/1094599"},{"type":"ADVISORY","url":"http://secunia.com/advisories/51676"},{"type":"WEB","url":"http://ubuntu.com/usn/usn-1680-1"}],"affected":[{"package":{"name":"moin","ecosystem":"PyPI","purl":"pkg:pypi/moin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"1.9.3"},{"fixed":"1.9.6"}]}],"versions":["1.9.3","1.9.4","1.9.5"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/moin/PYSEC-2013-5.yaml"}}],"schema_version":"1.7.3"}