Jamie Strandboge of the Ubuntu Security Team reported:
a cross-site scripting (XSS) flaw, present in the Moin's Despam
action module, providing possibility mass to revert changes done
by some specific author / bot. Unprivileged Moin user could provide
a specially-crafted HTML page and trick the privileged user into
running the Despam action on it, leading to disclosure of sensitive
information, denial of 'revert changes service' or potentially,
of the privileged Moin user.
Public reproducer from Jamie (from ):
XSS in Despam page. To reproduce:
2. click 'Create new empty page' with text 'Describe TestXSS<blink>WARNING</blink> here.'
3. click Save
4. Login as someone who can Despam (eg, superuser)
5. go to http://localhost/MyWiki/TestXSS%3Cblink%3EWARNING%3C/blink%3E?action=Despam
6. click the appropriate 'Select Author' link (usually the 'localhost' link. If this doesn't work, then login as a non-superuser, make a small edit to the page (eg, remove 'here' from the first line), then log back in as superuser and try to Despam again, clicking 'Select Author' for the user that just made the edit)
7. click 'Revert All!'
8. observe a lot of blinking text (from the pagename)
This issue affects the current versions of the moin package,
as shipped with Fedora release of 11 and 12.
moin-1.9.2-2.fc13 has been submitted as an update for Fedora 13.
moin-1.8.7-2.fc12 has been submitted as an update for Fedora 12.
moin-1.8.7-2.fc11 has been submitted as an update for Fedora 11.
moin-1.8.7-2.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report.
moin-1.8.7-2.fc12 has been pushed to the Fedora 12 stable repository. If problems still persist, please make note of it in this bug report.
moin-1.9.2-2.fc13 has been pushed to the Fedora 13 stable repository. If problems still persist, please make note of it in this bug report.
The packages are in stable now, closing.