Vulnerability Details : CVE-2008-1937
Potential exploit
The user form processing (userform.py) in MoinMoin before 1.6.3, when using ACLs or a non-empty superusers list, does not properly manage users, which allows remote attackers to gain privileges.
Products affected by CVE-2008-1937
- cpe:2.3:a:moinmoin:moinmoin:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:moinmoin:moinmoin:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmoin:moinmoin:1.6.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-1937
0.90%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-1937
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2008-1937
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-1937
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41909
MoinMoin userform security bypass CVE-2008-1937 Vulnerability Report
-
http://secunia.com/advisories/29894
Vendor Advisory
-
http://moinmo.in/SecurityFixes
SecurityFixes - MoinMoin
-
http://security.gentoo.org/glsa/glsa-200805-09.xml
MoinMoin: Privilege escalation (GLSA 200805-09) — Gentoo security
-
http://hg.moinmo.in/moin/1.6/rev/f405012e67af
404 Not FoundExploit
-
http://www.vupen.com/english/advisories/2008/1307/references
Site en construction
-
http://www.securityfocus.com/bid/28869
Patch
-
http://secunia.com/advisories/30160
Jump to