Cross-site scripting (XSS) vulnerability in the reStructuredText (rst) parser in parser/text_rst.py in MoinMoin before 1.9.3, when docutils is installed or when "format rst" is set, allows remote attackers to inject arbitrary web script or HTML via a javascript: URL in the refuri attribute. NOTE: some of these details are obtained from third party information.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/46476 | vdb entry |
http://www.ubuntu.com/usn/USN-1604-1 | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055116.html | vendor advisory |
http://moinmo.in/SecurityFixes | patch vendor advisory |
http://www.debian.org/security/2011/dsa-2321 | vendor advisory |
http://www.vupen.com/english/advisories/2011/0588 | vdb entry |
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055124.html | vendor advisory |
http://secunia.com/advisories/43665 | third party advisory |
http://secunia.com/advisories/50885 | third party advisory |
http://www.vupen.com/english/advisories/2011/0455 | vdb entry vendor advisory |
http://secunia.com/advisories/43413 | third party advisory vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054544.html | vendor advisory |
http://www.vupen.com/english/advisories/2011/0571 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65545 | vdb entry |