MoinMoin 1.7.1 allows remote attackers to bypass the textcha protection mechanism by modifying the textcha-question and textcha-answer fields to have empty values.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.debian.org/security/2010/dsa-2024 | vendor advisory |
http://secunia.com/advisories/39284 | third party advisory |
http://www.vupen.com/english/advisories/2010/0831 | vdb entry |
http://www.ubuntu.com/usn/USN-925-1 | vendor advisory |