Executive Summary

Title MoinMoin vulnerabilities
NameUSN-977-1First vendor Publication2010-08-25
VendorUbuntuLast vendor Modification2010-08-25
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score4.3Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores


A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 9.04
Ubuntu 9.10
Ubuntu 10.04 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
python2.4-moinmoin 1.5.2-1ubuntu2.7

Ubuntu 8.04 LTS:
python-moinmoin 1.5.8-5.1ubuntu2.5

Ubuntu 9.04:
python-moinmoin 1.8.2-2ubuntu2.5

Ubuntu 9.10:
python-moinmoin 1.8.4-1ubuntu1.3

Ubuntu 10.04 LTS:
python-moinmoin 1.9.2-2ubuntu3.1

In general, a standard system update will make all the necessary changes.

Details follow:

It was discovered that MoinMoin did not properly sanitize its input,
resulting in cross-site scripting (XSS) vulnerabilities. With cross-site
scripting vulnerabilities, if a user were tricked into viewing server
output during a crafted server request, a remote attacker could exploit
this to modify the contents, or steal confidential data, within the same

Original Source

Url : http://www.ubuntu.com/usn/USN-977-1

CWE : Common Weakness Enumeration

CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting')

CPE : Common Platform Enumeration


OpenVAS Exploits

2012-10-22Name : Gentoo Security Advisory GLSA 201210-02 (MoinMoin)
File : nvt/glsa_201210_02.nasl
2010-08-30Name : Ubuntu Update for moin vulnerabilities USN-977-1
File : nvt/gb_ubuntu_USN_977_1.nasl
2010-08-21Name : Debian Security Advisory DSA 2083-1 (moin)
File : nvt/deb_2083_1.nasl
2010-07-05Name : MoinMoin 'PageEditor.py' Cross-Site Scripting Vulnerability
File : nvt/gb_moinmoin_40549.nasl

Open Source Vulnerability Database (OSVDB)

66908MoinMoin action/recoverpass.py Unspecified Parameter XSS
66907MoinMoin action/newaccount.py Unspecified Parameter XSS
66906MoinMoin action/login.py Unspecified Parameter XSS
66905MoinMoin action/backup.py Unspecified Parameter XSS
66904MoinMoin action/RenamePage.py Unspecified Parameter XSS
66903MoinMoin action/Load.py Unspecified Parameter XSS
66902MoinMoin action/CopyPage.py Unspecified Parameter XSS
66901MoinMoin PageGraphicalEditor.py Unspecified Parameter XSS
66900MoinMoin Page.py Unspecified Parameter XSS
66899MoinMoin action/userprofile.py Unspecified Parameter XSS
66898MoinMoin action/chart.py Unspecified Parameter XSS
66897MoinMoin action/LikePages.py Unspecified Parameter XSS
66896MoinMoin action/language_setup.py Unspecified Parameter XSS
66895MoinMoin action/anywikidraw.py Unspecified Parameter XSS
66894MoinMoin action/SlideShow.py Unspecified Parameter XSS
65065MoinMoin PageEditor.py template Parameter XSS

Nessus® Vulnerability Scanner

2012-10-19Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201210-02.nasl - Type : ACT_GATHER_INFO
2010-08-26Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-977-1.nasl - Type : ACT_GATHER_INFO
2010-08-04Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2083.nasl - Type : ACT_GATHER_INFO
2010-06-07Name : A wiki application on the remote web server has a cross-site scripting vulner...
File : moinmoin_pageeditor_xss.nasl - Type : ACT_ATTACK

Alert History

If you want to see full details history, please login or register.
2014-02-17 12:07:01
  • Multiple Updates
2013-05-11 00:56:29
  • Multiple Updates