MoinMoin allows administrative access
|moinmoin-gain-admin-access (16465)||Medium Risk|
MoinMoin could allow a remote attacker to gain administrative access to MoinMoin. By creating an account that has the same name as an administrative group, a remote attacker will gain the privileges of that group.
Upgrade to the latest version of MoinMoin (1.2.2 or later), available from the SourceForge.net Web site. See References.
For Gentoo Linux:
Upgrade to the latest version of MoinMoin (1.2.2 or later), as listed in GLSA 200407-09. See References.
For other distributions:
Contact your vendor for upgrade or patch information.
- SourceForge.net: Project: MoinMoin: File List . (Vulnerability disclosed in ChangeLog under Version 1.2.2 (2004-06-06, Revision 1.185).)
- BID-10568: MoinMoin Group Name Privilege Escalation Vulnerability
- CVE-2004-0708: MoinMoin 1.2.1 and earlier allows remote attackers to gain privileges by creating a user with the same name as an existing group that has higher privileges.
- GLSA-200407-09: MoinMoin: Group ACL bypass
- OSVDB ID: 6704: MoinMoin Group ACL Bypass
- SA11807: MoinMoin Administrative Group Name Privilege Escalation Vulnerability
- Gentoo Linux
- MoinMoin MoinMoin prior to 1.2.2
Jun 18, 2004
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this