[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2014 moin -- several vulnerabilities

ID: oval:org.mitre.oval:def:7566Date: (C)2010-05-24   (M)2021-09-12
Class: PATCHFamily: unix




Several vulnerabilities have been discovered in moin, a python clone of WikiWiki. The Common Vulnerabilities and Exposures project identifies the following problems: Multiple security issues in MoinMoin related to configurations that have a non-empty superuser list, the xmlrpc action enabled, the SyncPages action enabled, or OpenID configured. MoinMoin does not properly sanitize user profiles. The default configuration of cfg.packagepages_actions_excluded in MoinMoin does not prevent unsafe package actions. In addition, this update fixes an error when processing hierarchical ACLs, which can be exploited to access restricted sub-pages.

Platform:
Debian 5.0
Product:
moin
Reference:
DSA-2014
CVE-2010-0668
CVE-2010-0669
CVE-2010-0717
CVE    3
CVE-2010-0717
CVE-2010-0669
CVE-2010-0668
CPE    1
cpe:/o:debian:debian_linux:5.0

© SecPod Technologies