Name | moinmoin_rce |
CVE | CVE-2012-6495 |
Exploit Pack | CANVAS |
Description | moinmoin_rce |
Notes | CVE Name: CVE-2012-6495 VENDOR: http://moinmoi.in NOTES: This version of the exploit forces a callback by overwriting moin.wsgi. This makes it a one-shot exploit, and if it fails, will result in the remote MoinMoin install being corrupt. Make sure you set your callback IP address appropriately. Manually refreshing your browser may open up new listener shells even after the exploit has been run. Repeatability: One-shot CVE URL: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6495 CVSS: 6 |
Learn more about the CANVAS Exploit Pack here: CANVAS |