CVE-2009-0260

Source
https://nvd.nist.gov/vuln/detail/CVE-2009-0260
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2009-0260.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2009-0260
Aliases
Withdrawn
2024-06-30T13:40:11.774025Z
Published
2009-01-23T19:00:05Z
Modified
2024-05-14T20:59:08.746046Z
Downstream
Summary
[none]
Details

Multiple cross-site scripting (XSS) vulnerabilities in action/AttachFile.py in MoinMoin before 1.8.1 allow remote attackers to inject arbitrary web script or HTML via an AttachFile action to the WikiSandBox component with (1) the rename parameter or (2) the drawing parameter (aka the basename variable).

References

Affected packages

Debian:10 / moin

Package

Name
moin
Purl
pkg:deb/debian/moin?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.1-1.1

Ecosystem specific

{
    "urgency": "low"
}