Vulnerability Details : CVE-2008-6548
The rst parser (parser/text_rst.py) in MoinMoin 1.6.1 does not check the ACL of an included page, which allows attackers to read unauthorized include files via unknown vectors.
Products affected by CVE-2008-6548
- cpe:2.3:a:moinmo:moinmoin:1.6.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-6548
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 43 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-6548
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2008-6548
-
Assigned by: nvd@nist.gov (Primary)
-
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-6548
-
http://moinmo.in/SecurityFixes
SecurityFixes - MoinMoinRelease Notes;Vendor Advisory
-
http://osvdb.org/48877
Broken Link
-
http://hg.moinmo.in/moin/1.6/rev/35ff7a9b1546
404 Not FoundBroken Link;Vendor Advisory
Jump to