CVE-2011-1058

Cross-site scripting (XSS) vulnerability in the reStructuredText (rst) parser in parser/text_rst.py in MoinMoin before 1.9.3, when docutils is installed or when "format rst" is set, allows remote attackers to inject arbitrary web script or HTML via a javascript: URL in the refuri attribute. NOTE: some of these details are obtained from third party information.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054544.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055116.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055124.html
http://moinmo.in/SecurityFixes Patch Vendor Advisory
http://secunia.com/advisories/43413 Vendor Advisory
http://secunia.com/advisories/43665
http://secunia.com/advisories/50885
http://www.debian.org/security/2011/dsa-2321
http://www.securityfocus.com/bid/46476
http://www.ubuntu.com/usn/USN-1604-1
http://www.vupen.com/english/advisories/2011/0455 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0571
http://www.vupen.com/english/advisories/2011/0588
https://exchange.xforce.ibmcloud.com/vulnerabilities/65545
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054544.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055116.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055124.html
http://moinmo.in/SecurityFixes Patch Vendor Advisory
http://secunia.com/advisories/43413 Vendor Advisory
http://secunia.com/advisories/43665
http://secunia.com/advisories/50885
http://www.debian.org/security/2011/dsa-2321
http://www.securityfocus.com/bid/46476
http://www.ubuntu.com/usn/USN-1604-1
http://www.vupen.com/english/advisories/2011/0455 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0571
http://www.vupen.com/english/advisories/2011/0588
https://exchange.xforce.ibmcloud.com/vulnerabilities/65545
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:moinmo:moinmoin:*:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.1:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.2:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.3:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.4:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.5:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.6:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.7:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.8:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.9:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.10:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:0.11:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.0:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.1:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.2:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.3.5:rc1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.4:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.0:beta1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.0:beta2:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.0:beta3:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.0:beta4:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.0:beta5:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.0:beta6:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.3:rc1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.3:rc2:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.5:a:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.5:rc1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.5a:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.0:beta1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.0:beta2:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.0:rc2:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.7.0:beta1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.7.0:beta2:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.7.0:rc2:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.7.0:rc3:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.8.6:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.8.7:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.8.8:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:moinmo:moinmoin:1.9.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:25

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054544.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054544.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055116.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055116.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055124.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055124.html -
References () http://moinmo.in/SecurityFixes - Patch, Vendor Advisory () http://moinmo.in/SecurityFixes - Patch, Vendor Advisory
References () http://secunia.com/advisories/43413 - Vendor Advisory () http://secunia.com/advisories/43413 - Vendor Advisory
References () http://secunia.com/advisories/43665 - () http://secunia.com/advisories/43665 -
References () http://secunia.com/advisories/50885 - () http://secunia.com/advisories/50885 -
References () http://www.debian.org/security/2011/dsa-2321 - () http://www.debian.org/security/2011/dsa-2321 -
References () http://www.securityfocus.com/bid/46476 - () http://www.securityfocus.com/bid/46476 -
References () http://www.ubuntu.com/usn/USN-1604-1 - () http://www.ubuntu.com/usn/USN-1604-1 -
References () http://www.vupen.com/english/advisories/2011/0455 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0455 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0571 - () http://www.vupen.com/english/advisories/2011/0571 -
References () http://www.vupen.com/english/advisories/2011/0588 - () http://www.vupen.com/english/advisories/2011/0588 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/65545 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/65545 -

Information

Published : 2011-02-22 18:00

Updated : 2024-11-21 01:25


NVD link : CVE-2011-1058

Mitre link : CVE-2011-1058

CVE.ORG link : CVE-2011-1058


JSON object : View

Products Affected

moinmo

  • moinmoin
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')