Multiple cross-site scripting (XSS) vulnerabilities in action/AttachFile.py in MoinMoin 1.8.2 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) an AttachFile sub-action in the error_msg function or (2) multiple vectors related to package file errors in the upload_form function, different vectors than CVE-2009-0260.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/50356 | vdb entry |
http://moinmo.in/SecurityFixes | patch vendor advisory |
http://www.vupen.com/english/advisories/2009/1119 | vdb entry vendor advisory |
http://hg.moinmo.in/moin/1.8/rev/5f51246a4df1 | exploit |
http://www.securityfocus.com/bid/34631 | vdb entry |
http://secunia.com/advisories/35024 | third party advisory |
http://secunia.com/advisories/34945 | third party advisory |
http://www.debian.org/security/2009/dsa-1791 | vendor advisory |
http://secunia.com/advisories/34821 | third party advisory vendor advisory |
http://www.ubuntu.com/usn/USN-774-1 | vendor advisory |