
CVE-2020-15275 – malicious SVG attachment causing stored XSS vulnerability in MoinMoin
https://notcve.org/view.php?id=CVE-2020-15275
11 Nov 2020 — MoinMoin is a wiki engine. In MoinMoin before version 1.9.11, an attacker with write permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki. Users are strongly advised to upgrade to a patched version. MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes. • https://advisory.checkmarx.net/advisory/CX-2020-4285 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2020-25074 – Ubuntu Security Notice USN-4629-1
https://notcve.org/view.php?id=CVE-2020-25074
10 Nov 2020 — The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution. La acción de la caché en el archivo action/cache.py en MoinMoin versiones hasta 1.9.10, permite el salto de directorio por medio de una petición HTTP diseñada. Un atacante que pueda cargar archivos adjuntos a la wiki puede usar esto para lograr una ejecución de código remota Michael Cha... • http://moinmo.in/SecurityFixes • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2017-5934 – Ubuntu Security Notice USN-3794-1
https://notcve.org/view.php?id=CVE-2017-5934
15 Oct 2018 — Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Una vulnerabilidad Cross-Site Scripting (XSS) en el diálogo de enlaces en el editor de la interfaz gráfica de MoinMoin en versiones anteriores a la 1.9.10 permite a atacantes remotos inyectar scripts web o HTML arbitrarios utilizando vectores no especificados. It was discovered that MoinMoin incorrectly handled certain i... • http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00024.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2016-9119 – Ubuntu Security Notice USN-3137-1
https://notcve.org/view.php?id=CVE-2016-9119
24 Nov 2016 — Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de XSS en el link de diálogo en el editor de GUI en MoinMoin en versiones anteriores a 1.9.8 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios mediante vectores no especificados. It was discovered that MoinMoin did not properly sanitize certain inputs, resulting in cross-sit... • http://www.debian.org/security/2016/dsa-3715 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2012-6081 – MoinMoin - twikidraw Action Traversal Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2012-6081
03 Jan 2013 — Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, as exploited in the wild in July 2012. Múltiples subidas de fichero sin restricción en las acciones 1) twikidraw (action/twikidraw... • https://packetstorm.news/files/id/122079 •

CVE-2012-6080 – Gentoo Linux Security Advisory 201309-14
https://notcve.org/view.php?id=CVE-2012-6080
03 Jan 2013 — Directory traversal vulnerability in the _do_attachment_move function in the AttachFile action (action/AttachFile.py) in MoinMoin 1.9.3 through 1.9.5 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in a file name. Vulnerabilidad de salto de directorio en la función _do_attachment_move en una acción AttachFile (action/AttachFile.py) en MoinMoin v1.9.3 hasta v1.9.5 permite a atacantes remotos sobreescribir archivos arbitrarios a través de .. (punto punto) en un nombre de archivo. Multi... • http://hg.moinmo.in/moin/1.9/rev/3c27131a3c52 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2012-6082 – Gentoo Linux Security Advisory 201309-14
https://notcve.org/view.php?id=CVE-2012-6082
03 Jan 2013 — Cross-site scripting (XSS) vulnerability in the rsslink function in theme/__init__.py in MoinMoin 1.9.5 allows remote attackers to inject arbitrary web script or HTML via the page name in a rss link. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en la función rsslink en theme/__init__.py en MoinMoin 1.9.5 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del nombre de la página en un enlace RSS. Multiple vulnerabilities have been reported in Moi... • http://hg.moinmo.in/moin/1.9/rev/c98ec456e493 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2012-6495 – MoinMoin - twikidraw Action Traversal Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2012-6495
03 Jan 2013 — Multiple directory traversal vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to overwrite arbitrary files via unspecified vectors. NOTE: this can be leveraged with CVE-2012-6081 to execute arbitrary code. Múltiples vulnerabilidades de salto de directorio en (1) twikidraw (acction/twikidraw.py) y (2) anywikidraw (acction/anywikidraw.py), acciones en MoinMoin antes de... • https://www.exploit-db.com/exploits/26422 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2012-4404
https://notcve.org/view.php?id=CVE-2012-4404
10 Sep 2012 — security/__init__.py in MoinMoin 1.9 through 1.9.4 does not properly handle group names that contain virtual group names such as "All," "Known," or "Trusted," which allows remote authenticated users with virtual group membership to be treated as a member of the group. security/__init__.py en MoinMoin v1.9 hasta v1.9.4 no trata correctamente los nombres de los grupos que contienen nombres de grupos virtuales tales como "All", "Known", o "Trusted", lo que permite ser tratados como miembros del grupo no-virtua... • http://hg.moinmo.in/moin/1.9/rev/7b9f39289e16 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2011-1058
https://notcve.org/view.php?id=CVE-2011-1058
22 Feb 2011 — Cross-site scripting (XSS) vulnerability in the reStructuredText (rst) parser in parser/text_rst.py in MoinMoin before 1.9.3, when docutils is installed or when "format rst" is set, allows remote attackers to inject arbitrary web script or HTML via a javascript: URL in the refuri attribute. NOTE: some of these details are obtained from third party information. Una vulnerabilidad de tipo cross-site scripting (XSS) en el analizador reStructuredText (rst) en parser/text_rst.py en MoinMoin anterior a versión 1.... • http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054544.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •