Pentester Lab: CVE-2012-6081: MoinMoin code exec

  • Name: Pentester Lab: CVE-2012-6081: MoinMoin code exec
  • Date release: 24 Apr 2013

Please remember that VulnHub is a free community resource so we are unable to check the machines that are provided to us. Before you download, please read our FAQs sections dealing with the dangers of running unknown VMs and our suggestions for "protecting yourself and your network. If you understand the risks, please download!


(Size: 162 MB)


(Size: 165 MB)




This exercise explains how you can exploit CVE-2012-6081 to gain code execution. This vulnerability was exploited to compromise Debian's wiki and Python documentation website

What you will learn?

  • Exploiting CVE-2012-6081
  • Basics of the tar file format
  • Python code execution

  • Filename: cve-2012-6081_i386.iso
  • File size: 162 MB
  • MD5: F860AA584C355F5E91E21E2519AB4A74
  • SHA1: EFA569E0183D5668A163784AD7279BAB38DF4DF9

  • Filename: _cve-2012-6081.iso
  • File size: 165 MB
  • MD5: A1B72E608C3D268AF765C2F1E219A8A2
  • SHA1: 3C445D8909C2C12046EC55B3C9F57048A3217B08

  • Format: Disk Image (.ISO)
  • Operating System: Linux

  • DHCP service: Enabled
  • IP address: Automatically assign