First published: Wed Mar 05 2008(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin 1.5.8 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) certain input processed by `formatter/text_gedit.py` (aka the gui editor formatter); (2) a page name, which triggers an injection in PageEditor.py when the page is successfully deleted by a victim in a DeletePage action; or (3) the destination page name for a RenamePage action, which triggers an injection in PageEditor.py when a victim's rename attempt fails because of a duplicate name. NOTE: the AttachFile XSS issue is already covered by CVE-2008-0781, and the login XSS issue is already covered by CVE-2008-0780. The issue has been fixed on [d0152eeb4499](http://hg.moinmo.in/moin/1.5/rev/d0152eeb4499) and [4ede07e792dd](http://hg.moinmo.in/moin/1.5/rev/4ede07e792dd).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/moin | <=1.5.8 | |
Mastodon | <=1.5.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1098 is classified as a medium severity vulnerability due to its potential for cross-site scripting attacks.
To address CVE-2008-1098, upgrade to MoinMoin version 1.5.9 or later, which patches the vulnerabilities.
CVE-2008-1098 affects MoinMoin versions 1.5.8 and earlier.
CVE-2008-1098 allows remote attackers to exploit cross-site scripting vulnerabilities by injecting malicious scripts through manipulated input and page names.
Users and administrators of MoinMoin versions 1.5.8 and earlier are at risk from CVE-2008-1098 due to the possibility of XSS attacks.