CVE-2010-2487

Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin 1.7.3 and earlier, 1.8.x before 1.8.8, and 1.9.x before 1.9.3 allow remote attackers to inject arbitrary web script or HTML via crafted content, related to (1) Page.py, (2) PageEditor.py, (3) PageGraphicalEditor.py, (4) action/CopyPage.py, (5) action/Load.py, (6) action/RenamePage.py, (7) action/backup.py, (8) action/login.py, (9) action/newaccount.py, and (10) action/recoverpass.py.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809
http://hg.moinmo.in/moin/1.7/rev/37306fba2189
http://hg.moinmo.in/moin/1.8/raw-file/1.8.8/docs/CHANGES
http://hg.moinmo.in/moin/1.8/rev/4238b0c90871
http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES
http://hg.moinmo.in/moin/1.9/rev/68ba3cc79513
http://hg.moinmo.in/moin/1.9/rev/e50b087c4572
http://marc.info/?l=oss-security&m=127799369406968&w=2
http://marc.info/?l=oss-security&m=127809682420259&w=2
http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg Exploit Patch
http://moinmo.in/MoinMoinRelease1.8
http://moinmo.in/MoinMoinRelease1.9
http://moinmo.in/SecurityFixes Vendor Advisory
http://secunia.com/advisories/40836 Vendor Advisory
http://www.debian.org/security/2010/dsa-2083
http://www.securityfocus.com/bid/40549 Exploit
http://www.vupen.com/english/advisories/2010/1981 Vendor Advisory
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809
http://hg.moinmo.in/moin/1.7/rev/37306fba2189
http://hg.moinmo.in/moin/1.8/raw-file/1.8.8/docs/CHANGES
http://hg.moinmo.in/moin/1.8/rev/4238b0c90871
http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES
http://hg.moinmo.in/moin/1.9/rev/68ba3cc79513
http://hg.moinmo.in/moin/1.9/rev/e50b087c4572
http://marc.info/?l=oss-security&m=127799369406968&w=2
http://marc.info/?l=oss-security&m=127809682420259&w=2
http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg Exploit Patch
http://moinmo.in/MoinMoinRelease1.8
http://moinmo.in/MoinMoinRelease1.9
http://moinmo.in/SecurityFixes Vendor Advisory
http://secunia.com/advisories/40836 Vendor Advisory
http://www.debian.org/security/2010/dsa-2083
http://www.securityfocus.com/bid/40549 Exploit
http://www.vupen.com/english/advisories/2010/1981 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:moinmo:moinmoin:*:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.1:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.2:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.3:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.4:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.5:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.6:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.7:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.8:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.9:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.10:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.11:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.0:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.1:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.2:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.3.5:rc1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.4:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.0:beta1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.0:beta2:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.0:beta3:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.0:beta4:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.0:beta5:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.0:beta6:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.3:rc1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.3:rc2:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.5:rc1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.5a:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.0:beta1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.0:beta2:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.0:rc2:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.7.0:beta1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.7.0:beta2:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.7.0:rc2:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.7.0:rc3:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.7.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:moinmo:moinmoin:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.8.6:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.8.7:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:moinmo:moinmoin:1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.9.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:16

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809 -
References () http://hg.moinmo.in/moin/1.7/rev/37306fba2189 - () http://hg.moinmo.in/moin/1.7/rev/37306fba2189 -
References () http://hg.moinmo.in/moin/1.8/raw-file/1.8.8/docs/CHANGES - () http://hg.moinmo.in/moin/1.8/raw-file/1.8.8/docs/CHANGES -
References () http://hg.moinmo.in/moin/1.8/rev/4238b0c90871 - () http://hg.moinmo.in/moin/1.8/rev/4238b0c90871 -
References () http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES - () http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES -
References () http://hg.moinmo.in/moin/1.9/rev/68ba3cc79513 - () http://hg.moinmo.in/moin/1.9/rev/68ba3cc79513 -
References () http://hg.moinmo.in/moin/1.9/rev/e50b087c4572 - () http://hg.moinmo.in/moin/1.9/rev/e50b087c4572 -
References () http://marc.info/?l=oss-security&m=127799369406968&w=2 - () http://marc.info/?l=oss-security&m=127799369406968&w=2 -
References () http://marc.info/?l=oss-security&m=127809682420259&w=2 - () http://marc.info/?l=oss-security&m=127809682420259&w=2 -
References () http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg - Exploit, Patch () http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg - Exploit, Patch
References () http://moinmo.in/MoinMoinRelease1.8 - () http://moinmo.in/MoinMoinRelease1.8 -
References () http://moinmo.in/MoinMoinRelease1.9 - () http://moinmo.in/MoinMoinRelease1.9 -
References () http://moinmo.in/SecurityFixes - Vendor Advisory () http://moinmo.in/SecurityFixes - Vendor Advisory
References () http://secunia.com/advisories/40836 - Vendor Advisory () http://secunia.com/advisories/40836 - Vendor Advisory
References () http://www.debian.org/security/2010/dsa-2083 - () http://www.debian.org/security/2010/dsa-2083 -
References () http://www.securityfocus.com/bid/40549 - Exploit () http://www.securityfocus.com/bid/40549 - Exploit
References () http://www.vupen.com/english/advisories/2010/1981 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1981 - Vendor Advisory

Information

Published : 2010-08-05 13:22

Updated : 2024-11-21 01:16


NVD link : CVE-2010-2487

Mitre link : CVE-2010-2487

CVE.ORG link : CVE-2010-2487


JSON object : View

Products Affected

moinmo

  • moinmoin
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')