moin@1.8.6 vulnerabilities

MoinMoin 1.9.11 is an easy to use, full-featured and extensible wiki software package

Direct Vulnerabilities

Known vulnerabilities in the moin package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Remote Code Execution (RCE)

Affected versions of this package are vulnerable to Remote Code Execution (RCE). The cache action in action/cache.py allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution.

How to fix Remote Code Execution (RCE)?

Upgrade moin to version 1.9.11 or higher.

[,1.9.11)
  • M
Cross-site Scripting (XSS)

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). An attacker with write permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki.

How to fix Cross-site Scripting (XSS)?

Upgrade moin to version 1.9.11 or higher.

[,1.9.11)
  • M
Cross-site Scripting (XSS)

moin is a wiki software package written in Python.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attacks via the GUI editor.

How to fix Cross-site Scripting (XSS)?

Upgrade moin to version 1.9.10 or higer.

[,1.9.10)
  • M
Cross-site Scripting (XSS)

moin is an easy to use, full-featured and extensible wiki software package.

MoinMoin 1.9.8 allows remote attackers to conduct "JavaScript injection" attacks by using the "page creation" approach, related to a "Cross Site Scripting (XSS)" issue affecting the action=AttachFile (via page name) component.

[,1.9.9)
  • M
Cross-site Scripting (XSS)

moin is an easy to use, full-featured and extensible wiki software package.

MoinMoin 1.9.8 allows remote attackers to conduct "JavaScript injection" attacks by using the "page creation or crafted URL" approach, related to a "Cross Site Scripting (XSS)" issue affecting the action=fckdialog&dialog=attachment (via page name) component.

[,1.9.9)
  • M
Cross-site Scripting (XSS)

moin is an easy to use, full-featured and extensible wiki software package.

Cross-site Scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

[,1.9.8)
  • M
Directory Traversal

moin is an easy to use, full-featured and extensible wiki software package.

Multiple directory traversal vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to overwrite arbitrary files via unspecified vectors. NOTE: this can be leveraged with CVE-2012-6081 to execute arbitrary code.

[,1.9.6)
  • M
Arbitrary Code Execution

moin is an easy to use, full-featured and extensible wiki software package.

Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, as exploited in the wild in July 2012.

[,1.9.6)
  • M
Cross-site Scripting (XSS)

moin is an easy to use, full-featured and extensible wiki software package.

Cross-site Scripting (XSS) vulnerability in the rsslink function in theme/init.py in MoinMoin 1.9.5 allows remote attackers to inject arbitrary web script or HTML via the page name in a rss link.

[,1.9.5)
  • L
Cross-site Scripting (XSS)

moin is an easy to use, full-featured and extensible wiki software package.

Cross-site Scripting (XSS) vulnerability in the reStructuredText (rst) parser in parser/text_rst.py in MoinMoin before 1.9.3, when docutils is installed or when "format rst" is set, allows remote attackers to inject arbitrary web script or HTML via a javascript: URL in the refuri attribute. NOTE: some of these details are obtained from third party information.

[,1.9.3)
  • M
Cross-site Scripting (XSS)

moin is an easy to use, full-featured and extensible wiki software package.

Multiple Cross-site Scripting (XSS) vulnerabilities in MoinMoin 1.7.3 and earlier, 1.8.x before 1.8.8, and 1.9.x before 1.9.3 allow remote attackers to inject arbitrary web script or HTML via crafted content, related to (1) Page.py, (2) PageEditor.py, (3) PageGraphicalEditor.py, (4) action/CopyPage.py, (5) action/Load.py, (6) action/RenamePage.py, (7) action/backup.py, (8) action/login.py, (9) action/newaccount.py, and (10) action/recoverpass.py.

[,1.7.3) [1.8,1.8.8) [1.9,1.9.3)
  • L
Cross-site Scripting (XSS)

moin is an easy to use, full-featured and extensible wiki software package.

Cross-site Scripting (XSS) vulnerability in action/Despam.py in the Despam action module in MoinMoin 1.8.7 and 1.9.2 allows remote authenticated users to inject arbitrary web script or HTML by creating a page with a crafted URI.

[,1.9.3)
  • M
Cross-site Scripting (XSS)

moin is an easy to use, full-featured and extensible wiki software package.

Unspecified vulnerability in MoinMoin 1.5.x through 1.7.x, 1.8.x before 1.8.7, and 1.9.x before 1.9.2 has unknown impact and attack vectors, related to configurations that have a non-empty superuser list, the xmlrpc action enabled, the SyncPages action enabled, or OpenID configured.

[,1.8.7) [1.9,1.9.2)
  • H
Cross-site Scripting (XSS)

moin is an easy to use, full-featured and extensible wiki software package.

MoinMoin before 1.8.7 and 1.9.x before 1.9.2 does not properly sanitize user profiles, which has unspecified impact and attack vectors.

[,1.8.7) [1.9,1.9.2)
  • H
Cross-site Scripting (XSS)

moin is an easy to use, full-featured and extensible wiki software package.

The default configuration of cfg.packagepages_actions_excluded in MoinMoin before 1.8.7 does not prevent unsafe package actions, which has unspecified impact and attack vectors.

[,1.8.7)
  • M
Information Exposure

moin is an easy to use, full-featured and extensible wiki software package.

MoinMoin 1.9 before 1.9.1 does not perform the expected clearing of the sys.argv array in situations where the GATEWAY_INTERFACE environment variable is set, which allows remote attackers to obtain sensitive information via unspecified vectors.

[,1.9.1)