5.8
CVSSv2

CVE-2007-2423

Published: 02/05/2007 Updated: 13/11/2008
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
VMScore: 585
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in index.php in MoinMoin 1.5.7 allows remote malicious users to inject arbitrary web script or HTML via the do parameter in an AttachFile action, a different vulnerability than CVE-2007-0857. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

moinmoin moinmoin 1.5.7

Vendor Advisories

Debian Bug report logs - #422408 [CVE-2007-2423] XSS in action=AttachFile&do= Package: python-moinmoin; Maintainer for python-moinmoin is Steve McIntyre <93sam@debianorg>; Source for python-moinmoin is src:moin (PTS, buildd, popcon) Reported by: Florian Weimer <fw@denebenyode> Date: Sat, 5 May 2007 18:30:0 ...
A flaw was discovered in MoinMoin’s error reporting when using the AttachFile action By tricking a user into viewing a crafted MoinMoin URL, an attacker could execute arbitrary JavaScript as the current MoinMoin user, possibly exposing the user’s authentication information for the domain where MoinMoin was hosted (CVE-2007-2423) ...
Several remote vulnerabilities have been discovered in MoinMoin, a Python clone of WikiWiki The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-2423 A cross-site-scripting vulnerability has been discovered in attachment handling CVE-2007-2637 Access control lists for calendars and includes wer ...

Exploits

source: wwwsecurityfocuscom/bid/23676/info MoinMoin is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site This may help the att ...