Vulnerability Name: | CVE-2008-1937 (CCN-41909) | ||||||||
Assigned: | 2008-04-21 | ||||||||
Published: | 2008-04-21 | ||||||||
Updated: | 2017-08-08 | ||||||||
Summary: | The user form processing (userform.py) in MoinMoin before 1.6.3, when using ACLs or a non-empty superusers list, does not properly manage users, which allows remote attackers to gain privileges. | ||||||||
CVSS v3 Severity: | 9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-264 | ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: MITRE Type: CNA CVE-2008-1937 Source: CONFIRM Type: Exploit http://hg.moinmo.in/moin/1.6/rev/f405012e67af Source: CCN Type: MoinMoin Web site MoinMoinDownload Source: CCN Type: MoinMoin SecurityFixes Web site Security Fix Announcements, moin 1.6.2 Source: CONFIRM Type: UNKNOWN http://moinmo.in/SecurityFixes Source: CCN Type: SA29894 MoinMoin Security Bypass Vulnerabilities Source: SECUNIA Type: Vendor Advisory 29894 Source: SECUNIA Type: UNKNOWN 30160 Source: GENTOO Type: UNKNOWN GLSA-200805-09 Source: CCN Type: GLSA-200805-09 MoinMoin: Privilege escalation Source: CCN Type: OSVDB ID: 44613 MoinMoin userform.py User Management Remote Privilege Escalation Source: CCN Type: OSVDB ID: 48875 MoinMoin acl_hierarchic ACL Processing Weakness Source: BID Type: Patch 28869 Source: CCN Type: BID-28869 MoinMoin Multiple ACL Security Bypass Vulnerabilities Source: VUPEN Type: UNKNOWN ADV-2008-1307 Source: XF Type: UNKNOWN moinmoin-userform-security-bypass(41909) Source: XF Type: UNKNOWN moinmoin-userform-security-bypass(41909) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |