Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2008-1098

Published: 5 March 2008

Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin 1.5.8 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) certain input processed by formatter/text_gedit.py (aka the gui editor formatter); (2) a page name, which triggers an injection in PageEditor.py when the page is successfully deleted by a victim in a DeletePage action; or (3) the destination page name for a RenamePage action, which triggers an injection in PageEditor.py when a victim's rename attempt fails because of a duplicate name. NOTE: the AttachFile XSS issue is already covered by CVE-2008-0781, and the login XSS issue is already covered by CVE-2008-0780.

Notes

AuthorNote
jdstrand
1.7.1 has corrected code

Priority

Low

Status

Package Release Status
moin
Launchpad, Ubuntu, Debian
dapper
Released (1.5.2-1ubuntu2.4)
edgy Ignored
(end of life, was needed)
feisty Ignored
(end of life, was needed)
gutsy
Released (1.5.7-3ubuntu2.1)
hardy Not vulnerable
(1.5.8-5.1ubuntu2)
intrepid Not vulnerable

upstream
Released (1.5.8-2)
Patches:
vendor: http://www.debian.org/security/2008/dsa-1514
other: http://hg.moinmo.in/moin/1.5/rev/4ede07e792dd