First published: Wed Jul 30 2008(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in `macro/AdvancedSearch.py` in moin (and MoinMoin) 1.6.3 and 1.7.0 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/moin | =1.7.0 | 1.7.1 |
pip/moin | <=1.6.3 | 1.6.4 |
Mastodon | =1.6.3 | |
Mastodon | =1.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3381 is classified as a high severity vulnerability due to its potential for allowing remote injection of malicious scripts.
To fix CVE-2008-3381, you should upgrade to version 1.7.1 or later if you are using 1.7.0, or upgrade to version 1.6.4 or later if you are using 1.6.3 or older.
Versions 1.6.3 and 1.7.0 of MoinMoin are vulnerable to CVE-2008-3381.
CVE-2008-3381 allows remote attackers to execute cross-site scripting (XSS) attacks, potentially leading to session hijacking or malicious actions performed on behalf of the user.
MoinMoin has ongoing support, but it's essential to use the latest versions to ensure all known vulnerabilities, including CVE-2008-3381, are patched.