Vulnerability Name:

CVE-2008-1937 (CCN-41909)

Assigned:2008-04-21
Published:2008-04-21
Updated:2017-08-08
Summary:The user form processing (userform.py) in MoinMoin before 1.6.3, when using ACLs or a non-empty superusers list, does not properly manage users, which allows remote attackers to gain privileges.
CVSS v3 Severity:9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2008-1937

Source: CONFIRM
Type: Exploit
http://hg.moinmo.in/moin/1.6/rev/f405012e67af

Source: CCN
Type: MoinMoin Web site
MoinMoinDownload

Source: CCN
Type: MoinMoin SecurityFixes Web site
Security Fix Announcements, moin 1.6.2

Source: CONFIRM
Type: UNKNOWN
http://moinmo.in/SecurityFixes

Source: CCN
Type: SA29894
MoinMoin Security Bypass Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
29894

Source: SECUNIA
Type: UNKNOWN
30160

Source: GENTOO
Type: UNKNOWN
GLSA-200805-09

Source: CCN
Type: GLSA-200805-09
MoinMoin: Privilege escalation

Source: CCN
Type: OSVDB ID: 44613
MoinMoin userform.py User Management Remote Privilege Escalation

Source: CCN
Type: OSVDB ID: 48875
MoinMoin acl_hierarchic ACL Processing Weakness

Source: BID
Type: Patch
28869

Source: CCN
Type: BID-28869
MoinMoin Multiple ACL Security Bypass Vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2008-1307

Source: XF
Type: UNKNOWN
moinmoin-userform-security-bypass(41909)

Source: XF
Type: UNKNOWN
moinmoin-userform-security-bypass(41909)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:moinmoin:moinmoin:1.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:moinmoin:moinmoin:1.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:moinmoin:moinmoin:1.6.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:moinmoin:moinmoin:1.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:moinmoin:moinmoin:1.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:moinmoin:moinmoin:1.6.2:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    moinmoin moinmoin 1.6.0
    moinmoin moinmoin 1.6.1
    moinmoin moinmoin 1.6.2
    moinmoin moinmoin 1.6.0
    moinmoin moinmoin 1.6.1
    moinmoin moinmoin 1.6.2
    gentoo linux *