#VU32754 Permissions, Privileges, and Access Controls in MoinMoin


Published: 2012-09-11 | Updated: 2020-07-28

Vulnerability identifier: #VU32754

Vulnerability risk: Low

CVSSv3.1: 3 [CVSS:3.1/CVSS:3.1/AV:N/AC:L/PR:/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-4404

CWE-ID: CWE-264

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
MoinMoin
Web applications / CMS

Vendor: MoinMoin

Description

The vulnerability allows a remote #AU# to read and manipulate data.

security/__init__.py in MoinMoin 1.9 through 1.9.4 does not properly handle group names that contain virtual group names such as "All," "Known," or "Trusted," which allows remote authenticated users with virtual group membership to be treated as a member of the group.

Mitigation
Install update from vendor's website.

Vulnerable software versions

MoinMoin: 1.9 - 1.9.4


External links
http://hg.moinmo.in/moin/1.9/rev/7b9f39289e16
http://moinmo.in/SecurityFixes
http://secunia.com/advisories/50474
http://secunia.com/advisories/50496
http://secunia.com/advisories/50885
http://www.debian.org/security/2012/dsa-2538
http://www.openwall.com/lists/oss-security/2012/09/04/4
http://www.openwall.com/lists/oss-security/2012/09/05/2
http://www.ubuntu.com/usn/USN-1604-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability