CVE-2008-6548: MoinMoin improper access control on the included page for the rst parser
(updated )
The rst parser (parser/text_rst.py) in MoinMoin 1.6.1 does not check the ACL of an included page, which allows attackers to read unauthorized include files via unknown vectors.
References
- github.com/advisories/GHSA-jhxw-4hw4-mhh7
- github.com/moinwiki/moin
- github.com/pypa/advisory-database/tree/main/vulns/moin/PYSEC-2009-11.yaml
- nvd.nist.gov/vuln/detail/CVE-2008-6548
- web.archive.org/web/20080523123729/http://hg.moinmo.in/moin/1.6/raw-file/1.6.2/docs/CHANGES
- web.archive.org/web/20211206185024/http://hg.moinmo.in/moin/1.6/rev/35ff7a9b1546
Detect and mitigate CVE-2008-6548 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →