Debian Security Advisory
DSA-1715-1 moin -- insufficient input sanitising
- Date Reported:
- 29 Jan 2009
- Affected Packages:
- moin
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 513158.
In Mitre's CVE dictionary: CVE-2009-0260, CVE-2009-0312. - More information:
-
It was discovered that the AttachFile action in moin, a python clone of WikiWiki, is prone to cross-site scripting attacks (CVE-2009-0260). Another cross-site scripting vulnerability was discovered in the antispam feature (CVE-2009-0312).
For the stable distribution (etch) these problems have been fixed in version 1.5.3-1.2etch2.
For the testing (lenny) distribution these problems have been fixed in version 1.7.1-3+lenny1.
For the unstable (sid) distribution these problems have been fixed in version 1.8.1-1.1.
We recommend that you upgrade your moin packages.
- Fixed in:
-
Debian GNU/Linux 4.0 (etch)
- Source:
- http://security.debian.org/pool/updates/main/m/moin/moin_1.5.3-1.2etch2.diff.gz
- http://security.debian.org/pool/updates/main/m/moin/moin_1.5.3.orig.tar.gz
- http://security.debian.org/pool/updates/main/m/moin/moin_1.5.3-1.2etch2.dsc
- http://security.debian.org/pool/updates/main/m/moin/moin_1.5.3.orig.tar.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/m/moin/python-moinmoin_1.5.3-1.2etch2_all.deb
- http://security.debian.org/pool/updates/main/m/moin/moinmoin-common_1.5.3-1.2etch2_all.deb
- http://security.debian.org/pool/updates/main/m/moin/moinmoin-common_1.5.3-1.2etch2_all.deb
MD5 checksums of the listed files are available in the original advisory.