First published: Thu Jan 03 2013(Updated: )
Cross-site scripting (XSS) vulnerability in the rsslink function in `theme/__init__.py` in MoinMoin before 1.9.6 allows remote attackers to inject arbitrary web script or HTML via the page name in a rss link.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/moin | <1.9.6 | 1.9.6 |
MoinMoin | =1.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6082 is classified as a medium severity vulnerability due to its potential for cross-site scripting (XSS) attacks.
To fix CVE-2012-6082, upgrade to MoinMoin version 1.9.6 or later.
CVE-2012-6082 affects MoinMoin versions prior to 1.9.6, including version 1.9.5.
CVE-2012-6082 is a cross-site scripting (XSS) vulnerability that allows attackers to inject malicious scripts.
Users of MoinMoin who use RSS links with unsanitized page names can be affected by CVE-2012-6082.