{"id":"PYSEC-2013-6","details":"Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, as exploited in the wild in July 2012.","aliases":["CVE-2012-6081","GHSA-m2c4-jgmm-fvq3"],"modified":"2024-04-29T16:56:27.651693Z","published":"2013-01-03T01:55:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/51676"},{"type":"WEB","url":"http://moinmo.in/SecurityFixes"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2012/12/29/6"},{"type":"WEB","url":"http://ubuntu.com/usn/usn-1680-1"},{"type":"WEB","url":"http://moinmo.in/MoinMoinRelease1.9"},{"type":"ADVISORY","url":"http://secunia.com/advisories/51696"},{"type":"WEB","url":"http://hg.moinmo.in/moin/1.9/rev/7e7e1cbb9d3f"},{"type":"ADVISORY","url":"http://www.debian.org/security/2012/dsa-2593"},{"type":"ADVISORY","url":"http://secunia.com/advisories/51663"},{"type":"WEB","url":"https://bugs.launchpad.net/ubuntu/+source/moin/+bug/1094599"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2012/12/30/4"},{"type":"WEB","url":"http://www.securityfocus.com/bid/57082"},{"type":"WEB","url":"http://www.exploit-db.com/exploits/25304"}],"affected":[{"package":{"name":"moin","ecosystem":"PyPI","purl":"pkg:pypi/moin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.9.6"}]}],"versions":["1.8.4","1.8.5","1.8.6","1.8.7","1.9.0","1.9.1","1.9.2","1.9.3","1.9.4","1.9.5"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/moin/PYSEC-2013-6.yaml"}}],"schema_version":"1.7.3"}