The vulnerability was exploited to compromise Debian's wiki and Python documentation website in December, 2012. The exploitation's method used is based on an exploit from Pastebin.
Vulnerability details
Advisory: SB2012072501 - Arbitrary file upload in MoinMoin
Vulnerable component: MoinMoin
CVE-ID: CVE-2012-6081
CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C
CWE-ID: CWE-434 - Unrestricted Upload of File with Dangerous Type
Description:
The vulnerability allows a remote authenticated attacker to compromise system.
The weakness exists due to insufficient validation of the filename extension when uploading files twikidraw (action/twikidraw.py) and anywikidraw (action/anywikidraw.py) actions. A remote authenticated attacker with write permissions can upload and execute arbitrary file with executable extension.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Note: the vulnerability was being actively exploited.
Public Exploits:
- MoinMoin - twikidraw Action Traversal Arbitrary File Upload (Metasploit) [Exploit-DB]
- MoinMoin - Arbitrary Command Execution [Exploit-DB]
External links:
http://hg.moinmo.in/moin/1.9/rev/7e7e1cbb9d3f
https://moinmo.in/SecurityFixes/AdvisoryForDistributors
https://moinmo.in/SecurityFixes/Installation
https://moinmo.in/SecurityFixes/CVE-2012-6081
https://pentesterlab.com/exercises/cve-2012-6081/course
https://community.rapid7.com/community/metasploit/blog/2013/06/27/from-the-wild-to-metasploit