lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <200901201625.n0KGPWKE026171@www3.securityfocus.com> Date: Tue, 20 Jan 2009 09:25:32 -0700 From: swhite@...urestate.com To: bugtraq@...urityfocus.com Subject: MoinMoin Wiki Engine XSS Vulnerability MoinMoin Wiki Engine Cross-Site Scripting Discovered by: SecureState R&D Team (sasquatch) Website: www.securestate.com Discovered: 01-08-09 Vendor Notified: 01-08-09 Vendor Fix Issued: 01-11-09 (http://hg.moinmo.in/moin/1.8/rev/8cb4d34ccbc1) Vendor Fix: Upgrade to version 1.8.1 Public Posting: 01-19-09 Example: http://moinmo.in/moinmoin/WikiSandBox?rename="><script>alert('rename xss')</script>&action=AttachFile&drawing="><script>alert('drawing xss')</script>