Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title MoinMoin vulnerabilities
Informations
NameUSN-977-1First vendor Publication2010-08-25
VendorUbuntuLast vendor Modification2010-08-25
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score4.3Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 9.04 Ubuntu 9.10 Ubuntu 10.04 LTS

This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the following package versions:

Ubuntu 6.06 LTS:
python2.4-moinmoin 1.5.2-1ubuntu2.7

Ubuntu 8.04 LTS:
python-moinmoin 1.5.8-5.1ubuntu2.5

Ubuntu 9.04:
python-moinmoin 1.8.2-2ubuntu2.5

Ubuntu 9.10:
python-moinmoin 1.8.4-1ubuntu1.3

Ubuntu 10.04 LTS:
python-moinmoin 1.9.2-2ubuntu3.1

In general, a standard system update will make all the necessary changes.

Details follow:

It was discovered that MoinMoin did not properly sanitize its input, resulting in cross-site scripting (XSS) vulnerabilities. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain.

Original Source

Url : http://www.ubuntu.com/usn/USN-977-1

CWE : Common Weakness Enumeration

idName
CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:11879
 
Oval ID: oval:org.mitre.oval:def:11879
Title: DSA-2083-1 moin -- missing input sanitisation
Description: It was discovered that moin, a python clone of WikiWiki, does not sufficiently sanitise parameters when passing them to the add_msg function. This allows a remote attackers to conduct cross-site scripting attacks for example via the template parameter. For the stable distribution, this problem has been fixed in version 1.7.1-3+lenny5. For the testing distribution, this problem will be fixed soon. For the unstable distribution, this problem has been fixed in version 1.9.3-1.
Family: unix Class: patch
Reference(s): DSA-2083-1
CVE-2010-2487
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): moin
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13311
 
Oval ID: oval:org.mitre.oval:def:13311
Title: USN-977-1 -- moin vulnerabilities
Description: It was discovered that MoinMoin did not properly sanitize its input, resulting in cross-site scripting vulnerabilities. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain.
Family: unix Class: patch
Reference(s): USN-977-1
CVE-2010-2487
CVE-2010-2969
CVE-2010-2970
Version: 5
Platform(s): Ubuntu 8.04
Ubuntu 10.04
Ubuntu 9.10
Ubuntu 6.06
Ubuntu 9.04
Product(s): moin
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application74

OpenVAS Exploits

DateDescription
2012-10-22Name : Gentoo Security Advisory GLSA 201210-02 (MoinMoin)
File : nvt/glsa_201210_02.nasl
2010-08-30Name : Ubuntu Update for moin vulnerabilities USN-977-1
File : nvt/gb_ubuntu_USN_977_1.nasl
2010-08-21Name : Debian Security Advisory DSA 2083-1 (moin)
File : nvt/deb_2083_1.nasl
2010-07-05Name : MoinMoin 'PageEditor.py' Cross-Site Scripting Vulnerability
File : nvt/gb_moinmoin_40549.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
66908MoinMoin action/recoverpass.py Unspecified Parameter XSS
66907MoinMoin action/newaccount.py Unspecified Parameter XSS
66906MoinMoin action/login.py Unspecified Parameter XSS
66905MoinMoin action/backup.py Unspecified Parameter XSS
66904MoinMoin action/RenamePage.py Unspecified Parameter XSS
66903MoinMoin action/Load.py Unspecified Parameter XSS
66902MoinMoin action/CopyPage.py Unspecified Parameter XSS
66901MoinMoin PageGraphicalEditor.py Unspecified Parameter XSS
66900MoinMoin Page.py Unspecified Parameter XSS
66899MoinMoin action/userprofile.py Unspecified Parameter XSS
66898MoinMoin action/chart.py Unspecified Parameter XSS
66897MoinMoin action/LikePages.py Unspecified Parameter XSS
66896MoinMoin action/language_setup.py Unspecified Parameter XSS
66895MoinMoin action/anywikidraw.py Unspecified Parameter XSS
66894MoinMoin action/SlideShow.py Unspecified Parameter XSS
65065MoinMoin PageEditor.py template Parameter XSS

Nessus® Vulnerability Scanner

DateDescription
2012-10-19Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201210-02.nasl - Type : ACT_GATHER_INFO
2010-08-26Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-977-1.nasl - Type : ACT_GATHER_INFO
2010-08-04Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2083.nasl - Type : ACT_GATHER_INFO
2010-06-07Name : A wiki application on the remote web server has a cross-site scripting vulner...
File : moinmoin_pageeditor_xss.nasl - Type : ACT_ATTACK

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2014-02-17 12:07:01
  • Multiple Updates
2013-05-11 00:56:29
  • Multiple Updates