Executive Summary

Informations
NameCVE-2009-4762First vendor Publication2010-03-29
VendorCveLast vendor Modification2010-05-27

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

MoinMoin 1.7.x before 1.7.3 and 1.8.x before 1.8.3 checks parent ACLs in certain inappropriate circumstances during processing of hierarchical ACLs, which allows remote attackers to bypass intended access restrictions by requesting an item, a different vulnerability than CVE-2008-6603.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4762

CWE : Common Weakness Enumeration

idName
CWE-264Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:13462
 
Oval ID: oval:org.mitre.oval:def:13462
Title: USN-941-1 -- moin vulnerability
Description: It was discovered that MoinMoin incorrectly handled hierarchical access control lists. Users could bypass intended access controls under certain circumstances.
Family: unix Class: patch
Reference(s): USN-941-1
CVE-2009-4762
Version: 5
Platform(s): Ubuntu 9.04
Product(s): moin
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application6

OpenVAS Exploits

DateDescription
2010-05-28Name : Ubuntu Update for moin vulnerability USN-941-1
File : nvt/gb_ubuntu_USN_941_1.nasl
2010-04-01Name : MoinMoin Wiki Security Bypass Vulnerability
File : nvt/secpod_moinmoin_wiki_acl_sec_bypass_vuln.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
54967MoinMoin Hierarchical ACL Handling Weakness Sub-pages Restriction Bypass

Nessus® Vulnerability Scanner

DateDescription
2010-05-21Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-941-1.nasl - Type : ACT_GATHER_INFO
2010-03-15Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2014.nasl - Type : ACT_GATHER_INFO

Internal Sources (Detail)

SourceUrl
BIDhttp://www.securityfocus.com/bid/35277
CONFIRMhttp://hg.moinmo.in/moin/1.7/rev/897cdbe9e8f2
http://hg.moinmo.in/moin/1.8/rev/897cdbe9e8f2
http://moinmo.in/SecurityFixes
DEBIANhttp://www.debian.org/security/2010/dsa-2014
SECUNIAhttp://secunia.com/advisories/39887
UBUNTUhttp://ubuntu.com/usn/usn-941-1
VUPENhttp://www.vupen.com/english/advisories/2010/0600
http://www.vupen.com/english/advisories/2010/1208

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2014-02-17 10:52:52
  • Multiple Updates
2013-05-11 00:04:24
  • Multiple Updates