CVE-2008-1098

medium

Description

Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin 1.5.8 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) certain input processed by formatter/text_gedit.py (aka the gui editor formatter); (2) a page name, which triggers an injection in PageEditor.py when the page is successfully deleted by a victim in a DeletePage action; or (3) the destination page name for a RenamePage action, which triggers an injection in PageEditor.py when a victim's rename attempt fails because of a duplicate name. NOTE: the AttachFile XSS issue is already covered by CVE-2008-0781, and the login XSS issue is already covered by CVE-2008-0780.

References

https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00538.html

https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00510.html

https://usn.ubuntu.com/716-1/

https://exchange.xforce.ibmcloud.com/vulnerabilities/41037

http://www.securityfocus.com/bid/28173

http://www.gentoo.org/security/en/glsa/glsa-200803-27.xml

http://www.debian.org/security/2008/dsa-1514

http://secunia.com/advisories/33755

http://secunia.com/advisories/30031

http://secunia.com/advisories/29444

http://secunia.com/advisories/29262

http://moinmo.in/SecurityFixes

http://hg.moinmo.in/moin/1.5/rev/d0152eeb4499

Details

Source: Mitre, NVD

Published: 2008-03-05

Updated: 2018-10-03

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Severity: Medium