GLSA-200408-25 : MoinMoin: Group ACL bypass

critical Nessus Plugin ID 14581

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200408-25 (MoinMoin: Group ACL bypass)

MoinMoin contains two unspecified bugs, one allowing anonymous users elevated access when not using ACLs, and the other in the ACL handling in the PageEditor.
Impact :

Restrictions on anonymous users were not properly enforced. This could lead to unauthorized users gaining administrative access to functions such as 'revert' and 'delete'. Sites are vulnerable whether or not they are using ACLs.
Workaround :

There is no known workaround.

Solution

All users should upgrade to the latest available version of MoinMoin, as follows:
# emerge sync # emerge -pv '>=www-apps/moinmoin-1.2.3' # emerge '>=www-apps/moinmoin-1.2.3'

See Also

http://www.nessus.org/u?e36556a4

https://security.gentoo.org/glsa/200408-25

Plugin Details

Severity: Critical

ID: 14581

File Name: gentoo_GLSA-200408-25.nasl

Version: 1.17

Type: local

Published: 8/30/2004

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:moinmoin, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 8/26/2004

Vulnerability Publication Date: 7/21/2004

Reference Information

CVE: CVE-2004-1462, CVE-2004-1463

GLSA: 200408-25