Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sun, 12 May 2013 17:30:30 +0200
From: Thomas Waldmann <tw@...dmann-edv.de>
To: Luciano Bello <luciano@...ian.org>
CC: oss-security@...ts.openwall.com, 
 Henrique de Moraes Holschuh <hmh@...ian.org>,
 security@...ian.org, tw-public@....de
Subject: Re: CVE request: MoinMoin Wiki (remote code execution vulnerability)

> The section 0x06 of http://www.exploit-db.com/papers/25306/ mention a 
> exploit for moinmoin, which looks connected with this vulnerability 
> http://www.securityfocus.com/bid/59728
> Can you please assign a CVE to it?

This is old news (and even the exploit code was out there before this
"publication", one just needed google to find it on some pastebins).
Back in December, CVE-2012-6081 was assigned for that and we fixed it
with the release of MoinMoin 1.9.6, see: https://moinmo.in/SecurityFixes


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.