USN-1680-1: MoinMoin vulnerabilities

Publication date

30 December 2012

Overview

MoinMoin could be made to run programs and overwrite files.


Packages

  • moin - Collaborative hypertext environment

Details

It was discovered that MoinMoin did not properly sanitize its input when
processing AnyWikiDraw and TWikiDraw actions. A remote attacker with write
access could exploit this to overwrite arbitrary files and execute
arbitrary code with the priviliges of the web server (user ‘www-data’).

It was discovered that MoinMoin also did not properly sanitize its input
when processing the AttachFile action. A remote attacker could exploit
this to overwrite files via directory traversal.

It was discovered that MoinMoin did not properly sanitize its input when
processing AnyWikiDraw and TWikiDraw actions. A remote attacker with write
access could exploit this to overwrite arbitrary files and execute
arbitrary code with the priviliges of the web server (user ‘www-data’).

It was discovered that MoinMoin also did not properly sanitize its input
when processing the AttachFile action. A remote attacker could exploit
this to overwrite files via directory traversal.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
12.10 quantal python-moinmoin –  1.9.3-1ubuntu3.1
12.04 precise python-moinmoin –  1.9.3-1ubuntu2.2
11.10 oneiric python-moinmoin –  1.9.3-1ubuntu1.11.10.2
10.04 lucid python-moinmoin –  1.9.2-2ubuntu3.3

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›