{"id":"CVE-2008-6548","details":"The rst parser (parser/text_rst.py) in MoinMoin 1.6.1 does not check the ACL of an included page, which allows attackers to read unauthorized include files via unknown vectors.","aliases":["GHSA-jhxw-4hw4-mhh7","PYSEC-2009-11"],"modified":"2024-06-04T04:00:19Z","published":"2009-03-30T01:30:00Z","withdrawn":"2024-06-30T15:58:52.248241Z","references":[{"type":"WEB","url":"http://hg.moinmo.in/moin/1.6/rev/35ff7a9b1546"},{"type":"WEB","url":"http://moinmo.in/SecurityFixes"},{"type":"WEB","url":"http://osvdb.org/48877"}],"affected":[{"package":{"name":"moin","ecosystem":"Debian:10","purl":"pkg:deb/debian/moin?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6.2-1"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2008-6548.json"}}],"schema_version":"1.7.3"}