Lucene search

K
githubGitHub Advisory DatabaseGHSA-JHXW-4HW4-MHH7
HistoryMay 17, 2022 - 5:52 a.m.

MoinMoin improper access control on the included page for the rst parser

2022-05-1705:52:47
CWE-862
GitHub Advisory Database
github.com
4

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

6.8 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

34.1%

The rst parser (parser/text_rst.py) in MoinMoin 1.6.1 does not check the ACL of an included page, which allows attackers to read unauthorized include files via unknown vectors.

Affected configurations

Vulners
Node
moinRange<1.6.2
CPENameOperatorVersion
moinlt1.6.2

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

6.8 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

34.1%

Related for GHSA-JHXW-4HW4-MHH7