Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://hg.moinmo.in/moin/1.9/rev/7b9f39289e16", "name": "http://hg.moinmo.in/moin/1.9/rev/7b9f39289e16", "tags": [], "refsource": "CONFIRM"}, {"url": "http://moinmo.in/SecurityFixes", "name": "http://moinmo.in/SecurityFixes", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.debian.org/security/2012/dsa-2538", "name": "DSA-2538", "tags": [], "refsource": "DEBIAN"}, {"url": "http://secunia.com/advisories/50496", "name": "50496", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.openwall.com/lists/oss-security/2012/09/05/2", "name": "[oss-security] 20120904 Re: CVE request: moinmoin incorrect ACL evaluation for virtual groups", "tags": [], "refsource": "MLIST"}, {"url": "http://www.openwall.com/lists/oss-security/2012/09/04/4", "name": "[oss-security] 20120904 CVE request: moinmoin incorrect ACL evaluation for virtual groups", "tags": [], "refsource": "MLIST"}, {"url": "http://secunia.com/advisories/50474", "name": "50474", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.ubuntu.com/usn/USN-1604-1", "name": "USN-1604-1", "tags": [], "refsource": "UBUNTU"}, {"url": "http://secunia.com/advisories/50885", "name": "50885", "tags": [], "refsource": "SECUNIA"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "security/__init__.py in MoinMoin 1.9 through 1.9.4 does not properly handle group names that contain virtual group names such as \"All,\" \"Known,\" or \"Trusted,\" which allows remote authenticated users with virtual group membership to be treated as a member of the group."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-264"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2012-4404", "ASSIGNER": "secalert@redhat.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 6.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 6.8, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2012-09-10T22:55Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:moinmo:moinmoin:1.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:moinmo:moinmoin:1.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:moinmo:moinmoin:1.9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:moinmo:moinmoin:1.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:moinmo:moinmoin:1.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2013-04-19T03:24Z"}