This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.
A wiki application on the remote web server is affected by a cross-
site scripting vulnerability.
The MoinMoin install hosted on the remote web server fails to properly
sanitize user-supplied input in the 'page_name' parameter when creating
an rss link. An attacker may be able to leverage this issue to inject
arbitrary HTML and script code into a user's browser to be executed
within the security context of the affected site.
Note that the application is also reportedly affected by a directory
traversal vulnerability (CVE-2012-6080) as well as a remote code
execution vulnerability (CVE-2012-6081). Nessus has not, however,
tested for these additional issues.
See also :
Upgrade to version 1.9.6 or later.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : true