Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title New moin packages fix cross-site scripting
Informations
Name DSA-2024 First vendor Publication 2010-03-31
Vendor Debian Last vendor Modification 2010-03-31
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Jamie Strandboge discovered that moin, a python clone of WikiWiki, does not sufficiently sanitize the page name in "Despam" action, allowing remote attackers to perform cross-site scripting (XSS) attacks.

In addition, this update fixes a minor issue in the "textcha" protection, it could be trivially bypassed by blanking the "textcha-question" and "textcha-answer" form fields.

For the stable distribution (lenny), these problems have been fixed in version 1.7.1-3+lenny4.

For the testing (squeeze) and unstable (sid) distribution, these problems will be fixed soon.

We recommend that you upgrade your moin package.

Original Source

Url : http://www.debian.org/security/2010/dsa-2024

CWE : Common Weakness Enumeration

% Id Name
21 % CWE-78 Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') (CWE/SANS Top 25)
10 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)
6 % CWE-20 Improper Input Validation
4 % CWE-532 Information Leak Through Log Files
4 % CWE-284 Access Control (Authorization) Issues
4 % CWE-276 Incorrect Default Permissions
3 % CWE-788 Access of Memory Location After End of Buffer (CWE/SANS Top 25)
3 % CWE-327 Use of a Broken or Risky Cryptographic Algorithm (CWE/SANS Top 25)
3 % CWE-264 Permissions, Privileges, and Access Controls
3 % CWE-256 Plaintext Storage of a Password
3 % CWE-122 Heap-based Buffer Overflow (CWE/SANS Top 25)
3 % CWE-61 UNIX Symbolic Link (Symlink) Following
3 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)
1 % CWE-787 Out-of-bounds Write (CWE/SANS Top 25)
1 % CWE-778 Insufficient Logging (CWE/SANS Top 25)
1 % CWE-732 Incorrect Permission Assignment for Critical Resource (CWE/SANS Top 25)
1 % CWE-640 Weak Password Recovery Mechanism for Forgotten Password
1 % CWE-613 Insufficient Session Expiration
1 % CWE-611 Information Leak Through XML External Entity File Disclosure
1 % CWE-522 Insufficiently Protected Credentials (CWE/SANS Top 25)
1 % CWE-502 Deserialization of Untrusted Data
1 % CWE-451 UI Misrepresentation of Critical Information
1 % CWE-434 Unrestricted Upload of File with Dangerous Type (CWE/SANS Top 25)
1 % CWE-427 Uncontrolled Search Path Element
1 % CWE-416 Use After Free
1 % CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
1 % CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
1 % CWE-319 Cleartext Transmission of Sensitive Information
1 % CWE-307 Improper Restriction of Excessive Authentication Attempts (CWE/SANS Top 25)
1 % CWE-306 Missing Authentication for Critical Function (CWE/SANS Top 25)
1 % CWE-290 Authentication Bypass by Spoofing
1 % CWE-285 Improper Access Control (Authorization)
1 % CWE-269 Improper Privilege Management
1 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
1 % CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25)
1 % CWE-23 Relative Path Traversal

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:13275
 
Oval ID: oval:org.mitre.oval:def:13275
Title: USN-925-1 -- moin vulnerabilities
Description: It was discovered that MoinMoin did not properly sanitize its input when processing Despam actions, resulting in cross-site scripting vulnerabilities. If a privileged wiki user were tricked into performing the Despam action on a page with a crafted title, a remote attacker could exploit this to execute JavaScript code. It was discovered that the TextCha protection in MoinMoin could be bypassed by submitting a crafted form request. This issue only affected Ubuntu 8.10
Family: unix Class: patch
Reference(s): USN-925-1
CVE-2010-0828
CVE-2010-1238
Version: 5
Platform(s): Ubuntu 8.04
Ubuntu 8.10
Ubuntu 9.10
Ubuntu 6.06
Ubuntu 9.04
Product(s): moin
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18244
 
Oval ID: oval:org.mitre.oval:def:18244
Title: DSA-2024-1 moin - cross-site scripting
Description: Jamie Strandboge discovered that moin, a python clone of WikiWiki, does not sufficiently sanitise the page name in "Despam" action, allowing remote attackers to perform cross-site scripting (XSS) attacks.
Family: unix Class: patch
Reference(s): DSA-2024-1
CVE-2010-0828
Version: 7
Platform(s): Debian GNU/Linux 5.0
Product(s): moin
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:7093
 
Oval ID: oval:org.mitre.oval:def:7093
Title: DSA-2024 moin -- insufficient input sanitising
Description: Jamie Strandboge discovered that moin, a python clone of WikiWiki, does not sufficiently sanitise the page name in "Despam" action, allowing remote attackers to perform cross-site scripting attacks. In addition, this update fixes a minor issue in the "textcha" protection, it could be trivially bypassed by blanking the "textcha-question" and "textcha-answer" form fields.
Family: unix Class: patch
Reference(s): DSA-2024
CVE-2010-0828
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): moin
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 1
Application 4
Application 3
Application 4
Application 13
Application 2
Application 3
Os 1

OpenVAS Exploits

Date Description
2012-10-22 Name : Gentoo Security Advisory GLSA 201210-02 (MoinMoin)
File : nvt/glsa_201210_02.nasl
2011-01-24 Name : FreeBSD Ports: moinmoin
File : nvt/freebsd_moinmoin6.nasl
2010-06-18 Name : Fedora Update for moin FEDORA-2010-9857
File : nvt/gb_fedora_2010_9857_moin_fc12.nasl
2010-06-18 Name : Fedora Update for moin FEDORA-2010-9876
File : nvt/gb_fedora_2010_9876_moin_fc11.nasl
2010-04-13 Name : MoinMoin Wiki Security Bypass Vulnerability
File : nvt/gb_moinmoin_wiki_bypass_vuln.nasl
2010-04-13 Name : MoinMoin 'Despam' Action Cross-Site Scripting Vulnerability
File : nvt/gb_moinmoin_wiki_xss_vuln.nasl
2010-04-09 Name : Fedora Update for moin FEDORA-2010-6012
File : nvt/gb_fedora_2010_6012_moin_fc11.nasl
2010-04-09 Name : Fedora Update for moin FEDORA-2010-6134
File : nvt/gb_fedora_2010_6134_moin_fc12.nasl
2010-04-09 Name : Ubuntu Update for moin vulnerabilities USN-925-1
File : nvt/gb_ubuntu_USN_925_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
63619 MoinMoin Multiple Field Textcha Protection Mechanism Bypass

63362 MoinMoin Despam.py Page Name XSS

MoinMoin contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the page name upon submission to the Despam.py script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.

Nessus® Vulnerability Scanner

Date Description
2012-10-19 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201210-02.nasl - Type : ACT_GATHER_INFO
2011-01-19 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_4c0173451d8911e0bbee0014a5e3cda6.nasl - Type : ACT_GATHER_INFO
2010-07-01 Name : The remote Fedora host is missing a security update.
File : fedora_2010-6012.nasl - Type : ACT_GATHER_INFO
2010-07-01 Name : The remote Fedora host is missing a security update.
File : fedora_2010-6134.nasl - Type : ACT_GATHER_INFO
2010-07-01 Name : The remote Fedora host is missing a security update.
File : fedora_2010-6180.nasl - Type : ACT_GATHER_INFO
2010-04-09 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-925-1.nasl - Type : ACT_GATHER_INFO
2010-04-01 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2024.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:29:20
  • Multiple Updates