CVE-2020-15275
malicious SVG attachment causing stored XSS vulnerability in MoinMoin
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
MoinMoin is a wiki engine. In MoinMoin before version 1.9.11, an attacker with write permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki. Users are strongly advised to upgrade to a patched version. MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes.
MoinMoin es un motor de wiki. En MoinMoin antes de la versión 1.9.11, un atacante con permisos de escritura puede cargar un archivo SVG que contiene javascript malicioso. Este javascript se ejecutará en el navegador de un usuario cuando el usuario esté viendo ese archivo SVG en la wiki. Se recomienda encarecidamente a los usuarios que se actualicen a una versión parcheada. MoinMoin Wiki versión 1.9.11 tiene las correcciones necesarias y también contiene otras correcciones importantes
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-06-25 CVE Reserved
- 2020-11-11 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://github.com/moinwiki/moin-1.9/releases/tag/1.9.11 | Release Notes | |
https://github.com/moinwiki/moin-1.9/security/advisories/GHSA-4q96-6xhq-ff43 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://advisory.checkmarx.net/advisory/CX-2020-4285 | 2024-08-04 |
URL | Date | SRC |
---|---|---|
https://github.com/moinwiki/moin-1.9/commit/31de9139d0aabc171e94032168399b4a0b2a88a2 | 2022-10-18 |
URL | Date | SRC |
---|