[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2009-0260Date: (C)2009-01-23   (M)2023-12-22


Multiple cross-site scripting (XSS) vulnerabilities in action/AttachFile.py in MoinMoin before 1.8.1 allow remote attackers to inject arbitrary web script or HTML via an AttachFile action to the WikiSandBox component with (1) the rename parameter or (2) the drawing parameter (aka the basename variable).

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.3
Exploit Score: 8.6
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
http://www.securityfocus.com/archive/1/500197/100/0/threaded
BID-33365
SECUNIA-33593
SECUNIA-33716
SECUNIA-33755
OSVDB-51485
ADV-2009-0195
DSA-1715
USN-716-1
http://hg.moinmo.in/moin/1.8/rev/8cb4d34ccbc1
http://moinmo.in/SecurityFixes#moin1.8.1
moinmoin-attachfilepy-xss(48126)

CWE    1
CWE-79
OVAL    8
oval:org.secpod.oval:def:101611
oval:org.mitre.oval:def:8023
oval:org.secpod.oval:def:101470
oval:org.secpod.oval:def:700313
...

© SecPod Technologies