USN-925-1 -- moin vulnerabilitiesID: oval:org.secpod.oval:def:700023 | Date: (C)2011-01-28 (M)2021-09-11 |
Class: PATCH | Family: unix |
It was discovered that MoinMoin did not properly sanitize its input when processing Despam actions, resulting in cross-site scripting vulnerabilities. If a privileged wiki user were tricked into performing the Despam action on a page with a crafted title, a remote attacker could exploit this to execute JavaScript code. It was discovered that the TextCha protection in MoinMoin could be bypassed by submitting a crafted form request. This issue only affected Ubuntu 8.10
Platform: |
Ubuntu 8.04 |
Ubuntu 8.10 |
Ubuntu 9.10 |
Ubuntu 6.06 |
Ubuntu 9.04 |