USN-421-1: MoinMoin vulnerability

Publication date

10 February 2007

Overview

MoinMoin vulnerability


Details

A flaw was discovered in MoinMoin’s page name sanitizer which could lead
to a cross-site scripting attack. By tricking a user into viewing a
crafted MoinMoin page, an attacker could execute arbitrary JavaScript as
the current MoinMoin user, possibly exposing the user’s authentication
information for the domain where MoinMoin was hosted.

A flaw was discovered in MoinMoin’s page name sanitizer which could lead
to a cross-site scripting attack. By tricking a user into viewing a
crafted MoinMoin page, an attacker could execute arbitrary JavaScript as
the current MoinMoin user, possibly exposing the user’s authentication
information for the domain where MoinMoin was hosted.

Update instructions

In general, a standard system upgrade is sufficient to effect the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
6.10 edgy python2.4-moinmoin –  1.5.3-1ubuntu1.1
6.06 dapper python2.4-moinmoin –  1.5.2-1ubuntu2.1
5.10 breezy moin –  1.2.4-1ubuntu2.1
python2.3-moinmoin –  1.3.4-6ubuntu1.1
python2.4-moinmoin –  1.3.4-6ubuntu1.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›