Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью
CVSS4: 6.9
CVSS3: 5.3
Описание
MoinMoin improper access control on the included page for the rst parser
The rst parser (parser/text_rst.py) in MoinMoin 1.6.1 does not check the ACL of an included page, which allows attackers to read unauthorized include files via unknown vectors.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2008-6548
- https://github.com/pypa/advisory-database/tree/main/vulns/moin/PYSEC-2009-11.yaml
- https://web.archive.org/web/20080523123729/http://hg.moinmo.in/moin/1.6/raw-file/1.6.2/docs/CHANGES
- https://web.archive.org/web/20211206185024/http://hg.moinmo.in/moin/1.6/rev/35ff7a9b1546
- http://hg.moinmo.in/moin/1.6/rev/35ff7a9b1546
- http://moinmo.in/SecurityFixes
Пакеты
Наименование
moin
pip
Затронутые версииВерсия исправления
< 1.6.2
1.6.2
Связанные уязвимости
ubuntu
больше 16 лет назад
The rst parser (parser/text_rst.py) in MoinMoin 1.6.1 does not check the ACL of an included page, which allows attackers to read unauthorized include files via unknown vectors.
nvd
больше 16 лет назад
The rst parser (parser/text_rst.py) in MoinMoin 1.6.1 does not check the ACL of an included page, which allows attackers to read unauthorized include files via unknown vectors.
debian
больше 16 лет назад
The rst parser (parser/text_rst.py) in MoinMoin 1.6.1 does not check t ...