First published: Fri Apr 03 2009(Updated: )
MoinMoin 1.6.2 and 1.7 does not properly enforce ACL checks when acl_hierarchic is set to True, which might allow remote attackers to bypass intended access restrictions, a different vulnerability than CVE-2008-1937.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/moin | =1.7 | 1.7.1 |
pip/moin | <1.6.3 | 1.6.3 |
MoinMoin | =1.6.2 | |
MoinMoin | =1.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6603 is considered a high severity vulnerability due to its potential to allow unauthorized access to restricted resources.
To fix CVE-2008-6603, upgrade MoinMoin to version 1.7.1 or above if you are using 1.7, or to version 1.6.3 if you are using 1.6.
The affected versions of MoinMoin include 1.6.2, 1.7.0, and 1.7.
CVE-2008-6603 affects the Access Control List (ACL) functionality in MoinMoin when 'acl_hierarchic' is set to True.
Yes, CVE-2008-6603 can be exploited remotely, allowing attackers to bypass intended access restrictions.