Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
NameCVE-2010-2487First vendor Publication2010-08-05
VendorCveLast vendor Modification2010-08-05

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score4.3Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin 1.7.3 and earlier, 1.8.x before 1.8.8, and 1.9.x before 1.9.3 allow remote attackers to inject arbitrary web script or HTML via crafted content, related to (1) Page.py, (2) PageEditor.py, (3) PageGraphicalEditor.py, (4) action/CopyPage.py, (5) action/Load.py, (6) action/RenamePage.py, (7) action/backup.py, (8) action/login.py, (9) action/newaccount.py, and (10) action/recoverpass.py.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2487

CWE : Common Weakness Enumeration

idName
CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:11879
 
Oval ID: oval:org.mitre.oval:def:11879
Title: DSA-2083-1 moin -- missing input sanitisation
Description: It was discovered that moin, a python clone of WikiWiki, does not sufficiently sanitise parameters when passing them to the add_msg function. This allows a remote attackers to conduct cross-site scripting attacks for example via the template parameter. For the stable distribution, this problem has been fixed in version 1.7.1-3+lenny5. For the testing distribution, this problem will be fixed soon. For the unstable distribution, this problem has been fixed in version 1.9.3-1.
Family: unix Class: patch
Reference(s): DSA-2083-1
CVE-2010-2487
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): moin
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application74

OpenVAS Exploits

DateDescription
2012-10-22Name : Gentoo Security Advisory GLSA 201210-02 (MoinMoin)
File : nvt/glsa_201210_02.nasl
2010-08-30Name : Ubuntu Update for moin vulnerabilities USN-977-1
File : nvt/gb_ubuntu_USN_977_1.nasl
2010-08-21Name : Debian Security Advisory DSA 2083-1 (moin)
File : nvt/deb_2083_1.nasl
2010-07-05Name : MoinMoin 'PageEditor.py' Cross-Site Scripting Vulnerability
File : nvt/gb_moinmoin_40549.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
66908MoinMoin action/recoverpass.py Unspecified Parameter XSS
66907MoinMoin action/newaccount.py Unspecified Parameter XSS
66906MoinMoin action/login.py Unspecified Parameter XSS
66905MoinMoin action/backup.py Unspecified Parameter XSS
66904MoinMoin action/RenamePage.py Unspecified Parameter XSS
66903MoinMoin action/Load.py Unspecified Parameter XSS
66902MoinMoin action/CopyPage.py Unspecified Parameter XSS
66901MoinMoin PageGraphicalEditor.py Unspecified Parameter XSS
66900MoinMoin Page.py Unspecified Parameter XSS
65065MoinMoin PageEditor.py template Parameter XSS

Nessus® Vulnerability Scanner

DateDescription
2012-10-19Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201210-02.nasl - Type : ACT_GATHER_INFO
2010-08-26Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-977-1.nasl - Type : ACT_GATHER_INFO
2010-08-04Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2083.nasl - Type : ACT_GATHER_INFO
2010-06-07Name : A wiki application on the remote web server has a cross-site scripting vulner...
File : moinmoin_pageeditor_xss.nasl - Type : ACT_ATTACK

Internal Sources (Detail)

SourceUrl
BIDhttp://www.securityfocus.com/bid/40549
CONFIRMhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809
http://hg.moinmo.in/moin/1.7/rev/37306fba2189
http://hg.moinmo.in/moin/1.8/raw-file/1.8.8/docs/CHANGES
http://hg.moinmo.in/moin/1.8/rev/4238b0c90871
http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES
http://hg.moinmo.in/moin/1.9/rev/68ba3cc79513
http://hg.moinmo.in/moin/1.9/rev/e50b087c4572
http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg
http://moinmo.in/MoinMoinRelease1.8
http://moinmo.in/MoinMoinRelease1.9
http://moinmo.in/SecurityFixes
DEBIANhttp://www.debian.org/security/2010/dsa-2083
MLISThttp://marc.info/?l=oss-security&m=127799369406968&w=2
http://marc.info/?l=oss-security&m=127809682420259&w=2
SECUNIAhttp://secunia.com/advisories/40836
VUPENhttp://www.vupen.com/english/advisories/2010/1981

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2014-02-17 10:56:09
  • Multiple Updates
2013-05-10 23:28:02
  • Multiple Updates