### [CVE-2012-6081](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6081) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, as exploited in the wild in July 2012. ### POC #### Reference - http://www.exploit-db.com/exploits/25304 #### Github - https://github.com/RedisMadani/cyber-vault - https://github.com/dxktw/cyber-vault - https://github.com/nemocyberworld/Captain-Nemo - https://github.com/nemocyberworld/captain-nemo - https://github.com/paulveillard/cybersecurity-infosec - https://github.com/shaynewang/exploits