Vulnerability CVE-2011-1058


Published: 2011-02-22   Modified: 2012-02-13

Description:
Cross-site scripting (XSS) vulnerability in the reStructuredText (rst) parser in parser/text_rst.py in MoinMoin before 1.9.3, when docutils is installed or when "format rst" is set, allows remote attackers to inject arbitrary web script or HTML via a javascript: URL in the refuri attribute. NOTE: some of these details are obtained from third party information.

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

CVSS2 => (AV:N/AC:H/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.6/10
2.9/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Moinmo -> Moinmoin 

 References:
http://moinmo.in/SecurityFixes
http://xforce.iss.net/xforce/xfdb/65545
http://www.vupen.com/english/advisories/2011/0588
http://www.vupen.com/english/advisories/2011/0571
http://www.vupen.com/english/advisories/2011/0455
http://www.securityfocus.com/bid/46476
http://www.debian.org/security/2011/dsa-2321
http://secunia.com/advisories/43665
http://secunia.com/advisories/43413
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055124.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055116.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054544.html

Copyright 2024, cxsecurity.com

 

Back to Top