2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-0260" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-01-23T19:00:05.233" ,
2025-04-09 02:05:49 +00:00
"lastModified" : "2025-04-09T00:30:58.490" ,
"vulnStatus" : "Deferred" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Multiple cross-site scripting (XSS) vulnerabilities in action/AttachFile.py in MoinMoin before 1.8.1 allow remote attackers to inject arbitrary web script or HTML via an AttachFile action to the WikiSandBox component with (1) the rename parameter or (2) the drawing parameter (aka the basename variable)."
} ,
{
"lang" : "es" ,
"value" : "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en action/AttachFile.py en MoinMoin antes de v1.8.1, permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante una acci\u00f3n AttachFile a el componente WikiSandBox con los par\u00e1metros (1) rename o (2) drawing (alias la variable basename)."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N" ,
2024-11-22 09:15:19 +00:00
"baseScore" : 4.3 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 09:15:19 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.8.0" ,
"matchCriteriaId" : "9CF9B689-609F-4BDA-AD95-BB43EA4A436C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F2D2866E-A684-4EB7-A127-5FEC934945E4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9D41FDF8-B8BD-43D9-8D53-ADCF15F7E16B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0BDC4AB6-39BF-4444-9CFE-B654A19814C7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:0.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0FD78CAE-9A9D-40AA-AD1F-C124A8315714"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:0.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8673FFE8-349E-4412-9913-1145DFA1EC46"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:0.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "24271A6D-21D9-4E8D-997F-0EC132518FBC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:0.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B3072B82-3D5C-46DF-8869-08FAAC5C70DD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:0.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "93508FCF-7852-4CB9-AD91-AB0FCD61BE43"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9B83ACA6-5C3C-46E3-805C-EE1E759B7331"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7F7EF155-C5E0-4473-B635-C551BF3F8EFC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ABFA7F26-835B-4454-91A2-1DBB80C53492"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C92D8510-CA34-4E6D-B432-997860C63B89"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EB2354B8-9A1A-4E75-92AC-F16CFDF91761"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6B44C24B-013E-4769-A200-D59752E0A041"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EB8DB90E-BEE5-447E-9F78-A96634343815"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "84317439-A287-4897-9608-65095860AB95"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2FB70477-B0F2-44D6-92A8-0F42F890CF99"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.5.3_rc1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "013FBB75-8B01-4249-9C6C-5E27964ED2D7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.5.3_rc2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "361C37DC-CB43-4E6A-A198-313A9D62CD18"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.5.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "22F3D66C-3D24-41D0-9E4B-BB458DD5517D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.5.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A4C9F85-C5EF-4991-A005-5839951B9843"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.5.5_rc1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "690F09A1-6195-404D-BDC3-5F02A4A201C7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.5.5a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F9C82F62-DFBB-4499-8C6D-27DA49A00F6F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.5.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "57003BFE-8FB2-480A-AFA1-63817B608F9C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.5.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B0FD9248-1E4B-46DC-9F78-20787F56D50B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.5.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "23539FCA-FF83-46E5-A9E2-5051D975DC12"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "10CFA717-B536-46CF-8D96-B850EB4C6F95"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "03FBCD1B-2D05-4C17-B41C-CF8DA75BB05D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "51DF4CAC-EDD8-4C71-BC77-0F516692B5FA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.6.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DB1CAAA6-8D33-4901-88E2-120AB7B4CD53"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.6.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1F89B87E-70F6-4B3C-B684-BE2666342F74"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "33BA7179-8A11-41C1-8F54-AC9316E8330D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "59C423EE-D9F5-4570-A5E8-1AA34F05E0EB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.7.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4B12CADC-8939-462C-8D40-DD56B13773AE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:moinmoin:moinmoin:1.7.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A19C0F96-9054-4DE9-92AD-A9DAF03B4960"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://hg.moinmo.in/moin/1.8/rev/8cb4d34ccbc1" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://moinmo.in/SecurityFixes#moin1.8.1" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://osvdb.org/51485" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/33593" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/33716" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/33755" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/archive/1/500197/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/33365" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Patch"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/0195" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/48126" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://usn.ubuntu.com/716-1/" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://www.debian.org/security/2009/dsa-1715" ,
"source" : "cve@mitre.org"
2024-11-22 09:15:19 +00:00
} ,
{
"url" : "http://hg.moinmo.in/moin/1.8/rev/8cb4d34ccbc1" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://moinmo.in/SecurityFixes#moin1.8.1" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://osvdb.org/51485" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/33593" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/33716" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/33755" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/500197/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/33365" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Patch"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/0195" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/48126" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://usn.ubuntu.com/716-1/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://www.debian.org/security/2009/dsa-1715" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}