Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : moin vulnerabilities (USN-925-1)

Ubuntu Security Notice (C) 2010-2013 Canonical, Inc. / NASL script (C) 2010-2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

It was discovered that MoinMoin did not properly sanitize its input
when processing Despam actions, resulting in cross-site scripting
(XSS) vulnerabilities. If a privileged wiki user were tricked into
performing the Despam action on a page with a crafted title, a remote
attacker could exploit this to execute JavaScript code.
(CVE-2010-0828)

It was discovered that the TextCha protection in MoinMoin could be
bypassed by submitting a crafted form request. This issue only
affected Ubuntu 8.10. (CVE-2010-1238).

Solution :

Update the affected moinmoin-common, python-moinmoin and / or
python2.4-moinmoin packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 45475 ()

Bugtraq ID: 39110

CVE ID: CVE-2010-0828
CVE-2010-1238