MoinMoin rsslink() Function page_name Parameter XSS

This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.

Synopsis :

A wiki application on the remote web server is affected by a cross-
site scripting vulnerability.

Description :

The MoinMoin install hosted on the remote web server fails to properly
sanitize user-supplied input in the 'page_name' parameter when creating
an rss link. An attacker may be able to leverage this issue to inject
arbitrary HTML and script code into a user's browser to be executed
within the security context of the affected site.

Note that the application is also reportedly affected by a directory
traversal vulnerability (CVE-2012-6080) as well as a remote code
execution vulnerability (CVE-2012-6081). Nessus has not, however,
tested for these additional issues.

See also :

Solution :

Upgrade to version 1.9.6 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 64931 ()

Bugtraq ID: 57089

CVE ID: CVE-2012-6082

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now