- Document moinmoin -- cross-site scripting vulnerabilities

This commit is contained in:
Martin Wilke 2009-05-16 13:01:25 +00:00
parent c4be440ddc
commit acebb5d2e2
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=233994

View File

@ -34,8 +34,38 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="bfe218a5-4218-11de-b67a-0030843d3802">
<topic>moinmoin -- cross-site scripting vulnerabilities</topic>
<affects>
<package>
<name>moinmoin</name>
<range><lt>1.8.3</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>secunia reports:</p>
<blockquote cite="http://secunia.com/advisories/34821/">
<p>Input passed via multiple parameters to action/AttachFile.py is not
properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in the context of an affected site.</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2009-1482</cvename>
<url>http://secunia.com/advisories/34821/</url>
<url>http://moinmo.in/SecurityFixes</url>
</references>
<dates>
<discovery>2009-04-21</discovery>
<entry>2009-05-16</entry>
</dates>
</vuln>
<vuln vid="4a638895-41b7-11de-b1cc-00219b0fc4d8">
<topic>mod_perl -- cross site scripting</topic>
<topic>mod_perl -- cross-site scripting</topic>
<affects>
<package>
<name>mod_perl</name>