First published: Tue Nov 10 2020(Updated: )
### Impact The cache action in action/cache.py allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution. ### Patches Users are strongly advised to upgrade to a patched version. MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes. ### Workarounds It is not advised to work around this, but to upgrade MoinMoin to a patched version. That said, a work around via disabling the `cache` or the `AttachFile` action might be possible. Also, it is of course helpful if you give `write` permissions (which include uploading attachments) only to trusted users. ### Credits This vulnerability was discovered by Michael Chapman. ### For more information If you have any questions or comments about this advisory, email me at [twaldmann@thinkmo.de](mailto:twaldmann@thinkmo.de).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/moin | 1.9.9-1+deb10u1 | |
pip/moin | <1.9.11 | 1.9.11 |
MoinMoin | <=1.9.10 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25074 has a high severity as it allows directory traversal that could lead to remote code execution.
To fix CVE-2020-25074, upgrade to MoinMoin Wiki version 1.9.11 or later.
CVE-2020-25074 affects users of MoinMoin Wiki versions prior to 1.9.11.
An attacker can exploit CVE-2020-25074 to perform directory traversal and potentially execute remote code.
Yes, a patch is available and users are strongly advised to upgrade to the patched version.