Bug 457362 (CVE-2008-3381)

Summary: CVE-2008-3381 moin: XSS issue in the advanced search form
Product: [Other] Security Response Reporter: Tomas Hoger <thoger>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: vpvainio
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2009-05-02 17:33:48 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 457363, 457364    
Bug Blocks:    

Description Tomas Hoger 2008-07-31 07:26:20 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-3381 to the
following vulnerability:

Multiple cross-site scripting (XSS) vulnerabilities in
macro/AdvancedSearch.py in moin (and MoinMoin) 1.6.3 and 1.7.0 allow
remote attackers to inject arbitrary web script or HTML via
unspecified vectors.

Upstream patches (1.6 and 1.7 branches):


Comment 1 Tomas Hoger 2008-07-31 07:27:51 UTC
There's no MoinMoin/macro/AdvancedSearch.py in moin 1.5.9 in F-8, so it's
probably unaffected.

Comment 3 Fedora Update System 2009-04-20 15:18:38 UTC
moin-1.6.4-1.fc10 has been submitted as an update for Fedora 10.

Comment 4 Fedora Update System 2009-04-20 15:41:55 UTC
moin-1.6.4-1.fc9 has been submitted as an update for Fedora 9.

Comment 5 Fedora Update System 2009-04-22 01:03:50 UTC
moin-1.6.4-1.fc9 has been pushed to the Fedora 9 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 6 Fedora Update System 2009-04-22 01:11:31 UTC
moin-1.6.4-1.fc10 has been pushed to the Fedora 10 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 7 Ville-Pekka Vainio 2009-05-02 17:33:48 UTC
I'm closing this bug because the fix has been pushed and the update had security team approval. Please reopen if something related to this vulnerability is not fixed.