Multiple cross-site scripting (XSS) vulnerabilities in action/AttachFile.py in MoinMoin before 1.8.1 allow remote attackers to inject arbitrary web script or HTML via an AttachFile action to the WikiSandBox component with (1) the rename parameter or (2) the drawing parameter (aka the basename variable).
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1715-1 | New moin packages fix insufficient input sanitising |
EUVD |
EUVD-2022-3012 | Multiple cross-site scripting (XSS) vulnerabilities in action/AttachFile.py in MoinMoin before 1.8.1 allow remote attackers to inject arbitrary web script or HTML via an AttachFile action to the WikiSandBox component with (1) the rename parameter or (2) the drawing parameter (aka the basename variable). |
Github GHSA |
GHSA-7hjm-hqgj-xv9f | MoinMoin Multiple cross-site scripting (XSS) vulnerabilities |
Ubuntu USN |
USN-716-1 | MoinMoin vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T04:24:18.448Z
Reserved: 2009-01-23T00:00:00
Link: CVE-2009-0260
No data.
Status : Deferred
Published: 2009-01-23T19:00:05.233
Modified: 2025-04-09T00:30:58.490
Link: CVE-2009-0260
No data.
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA
Ubuntu USN