CVE-2008-6603
https://notcve.org/view.php?id=CVE-2008-6603
MoinMoin 1.6.2 and 1.7 does not properly enforce ACL checks when acl_hierarchic is set to True, which might allow remote attackers to bypass intended access restrictions, a different vulnerability than CVE-2008-1937. MoinMoin v1.6.2 y v1.7 no maneja adecuadamente los puntos de cumplimiento de la ACL cuando acl_hierarchic esta fijado como Verdadero, lo que permitiría a atacantes remotos evitar las restricciones de acceso previstas, una vulnerabilidad diferente que CVE-2008-1937. • http://hg.moinmo.in/moin/1.6/rev/543ae9bdbe26 http://hg.moinmo.in/moin/1.7/rev/88356b3f849a http://moinmo.in/MoinMoinBugs/AclHierarchicPageAclSupercededByAclRightsAfter http://moinmo.in/SecurityFixes http://osvdb.org/48875 http://www.securityfocus.com/bid/34655 http://www.vupen.com/english/advisories/2008/1307 https://exchange.xforce.ibmcloud.com/vulnerabilities/41911 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2008-6548
https://notcve.org/view.php?id=CVE-2008-6548
The rst parser (parser/text_rst.py) in MoinMoin 1.6.1 does not check the ACL of an included page, which allows attackers to read unauthorized include files via unknown vectors. El analizador rst (parser/text_rst.py) en MoinMoin v1.6.1 no valida adecuadamente las ACL de la página web incluida , lo que permite a atacantes leer archivos sin autorización a través de vectores no especificados. • http://hg.moinmo.in/moin/1.6/rev/35ff7a9b1546 http://moinmo.in/SecurityFixes http://osvdb.org/48877 • CWE-862: Missing Authorization •
CVE-2008-6549
https://notcve.org/view.php?id=CVE-2008-6549
The password_checker function in config/multiconfig.py in MoinMoin 1.6.1 uses the cracklib and python-crack features even though they are not thread-safe, which allows remote attackers to cause a denial of service (segmentation fault and crash) via unknown vectors. La función password_checker en config/multiconfig.py en MoinMoin v1.6.1 utiliza la característica cracklib y python-crack incluso cuando ambas no están como "thread-safe", lo que permite a atacantes remotos provocar una denegación de servicio (falta de segmentación y caída) a través de vectores desconocidos. • http://hg.moinmo.in/moin/1.6/rev/35ff7a9b1546 http://moinmo.in/SecurityFixes http://osvdb.org/48876 •
CVE-2009-0312
https://notcve.org/view.php?id=CVE-2009-0312
Cross-site scripting (XSS) vulnerability in the antispam feature (security/antispam.py) in MoinMoin 1.7 and 1.8.1 allows remote attackers to inject arbitrary web script or HTML via crafted, disallowed content. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la característica antispam (security/antispam.py) en MoinMoin 1.7 y 1.8.1, permite a atacantes remotos inyectar secuencias de comandos Web o HTML de su elección a través de un contenido rechazado, manipulado. • http://hg.moinmo.in/moin/1.7/rev/89b91bf87dad http://hg.moinmo.in/moin/1.8/rev/89b91bf87dad http://moinmo.in/SecurityFixes#moin1.8.1 http://osvdb.org/51632 http://secunia.com/advisories/33716 http://secunia.com/advisories/33755 http://www.openwall.com/lists/oss-security/2009/01/27/4 https://exchange.xforce.ibmcloud.com/vulnerabilities/48306 https://usn.ubuntu.com/716-1 https://www.debian.org/security/2009/dsa-1715 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2009-0260 – MoinMoin 1.8 - 'AttachFile.py' Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2009-0260
Multiple cross-site scripting (XSS) vulnerabilities in action/AttachFile.py in MoinMoin before 1.8.1 allow remote attackers to inject arbitrary web script or HTML via an AttachFile action to the WikiSandBox component with (1) the rename parameter or (2) the drawing parameter (aka the basename variable). Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en action/AttachFile.py en MoinMoin antes de v1.8.1, permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante una acción AttachFile a el componente WikiSandBox con los parámetros (1) rename o (2) drawing (alias la variable basename). • https://www.exploit-db.com/exploits/32746 http://hg.moinmo.in/moin/1.8/rev/8cb4d34ccbc1 http://moinmo.in/SecurityFixes#moin1.8.1 http://osvdb.org/51485 http://secunia.com/advisories/33593 http://secunia.com/advisories/33716 http://secunia.com/advisories/33755 http://www.securityfocus.com/archive/1/500197/100/0/threaded http://www.securityfocus.com/bid/33365 http://www.vupen.com/english/advisories/2009/0195 https://exchange.xforce.ibmcloud.com/vulnerabilities/48126 h • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •