blob: ed7ccc04045fd4aedd146fab809b81e72a47ad82 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200805-09">
<title>MoinMoin: Privilege escalation</title>
A vulnerability in MoinMoin may allow a remote attacker to elevate his
<product type="ebuild">moinmoin</product>
<announced>May 11, 2008</announced>
<revised>May 11, 2008: 01</revised>
<package name="www-apps/moinmoin" auto="yes" arch="*">
<unaffected range="ge">1.6.3</unaffected>
<vulnerable range="lt">1.6.3</vulnerable>
MoinMoin is an advanced and extensible Wiki Engine.
It has been reported that the user form processing in the file does not properly manage users when using Access Control
Lists or a non-empty superusers list.
<impact type="normal">
A remote attacker could exploit this vulnerability to gain superuser
privileges on the application.
There is no known workaround at this time.
All MoinMoin users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-apps/moinmoin-1.6.3&quot;</code>
<uri link="">CVE-2008-1937</uri>
<metadata tag="requester" timestamp="Wed, 07 May 2008 22:43:27 +0000">
<metadata tag="bugReady" timestamp="Wed, 07 May 2008 22:49:11 +0000">
<metadata tag="submitter" timestamp="Fri, 09 May 2008 14:03:55 +0000">