Version 1.9.11

moin

MoinMoin 1.9.11 is an easy to use, full-featured and extensible wiki software package

Install Instructions

pip install moin
Current Version Release Date November 08, 2020
Language Python
Package URL (purl) pkg:pip/moin@1.9.11

Find moin vulnerabilities in your supply chain.

Scan for Free

moin Vulnerabilities

Sort by
icon CVE (Latest)
  • icon CVE (Latest)
  • icon CVE (Oldest)
  • icon CVSS Score (Highest)
  • icon CVSS Score (Lowest)
CVE question mark icon CVSS Score question mark icon CWE(s) question mark icon EPSS Score question mark icon EPSS % question mark icon Impacted Versions
CVE-2008-0781 Medium 4.3 CWE-79 0.00614 0.79322
  • 2.0.0a1–2.0.0b1
  • 1.8.4–1.9.11
CVE-2008-0782 Medium 5 CWE-22 0.03201 0.915
  • 2.0.0a1–2.0.0b1
  • 1.8.4–1.9.11
CVE-2008-1098 Medium 4.3 CWE-79 0.00494 0.76854
  • 2.0.0a1–2.0.0b1
  • 1.8.4–1.9.11
CVE-2008-1099 Medium 5 CWE-264 0.00848 0.82763
  • 2.0.0a1–2.0.0b1
  • 1.8.4–1.9.11
CVE-2012-6080 Medium 6.4 CWE-22 0.00664 0.80257
  • 1.9.3–1.9.5
CVE-2012-6081 Medium 6 CWE-94 0.95895 0.99525
  • 1.8.4–1.9.5
CVE-2012-6082 Medium 4.3 CWE-79 0.00258 0.66207
  • 1.8.4–1.9.5
CVE-2012-6495 Medium 6 CWE-22 0.03482 0.9182
  • 1.8.4–1.9.5
CVE-2016-7146 Medium 6.1 CWE-79 0.00203 0.58973
  • 1.8.4–1.9.8
CVE-2016-7148 Medium 6.1 CWE-79 0.00203 0.58973
  • 1.8.4–1.9.8
CVE-2016-9119 Medium 6.1 CWE-79 0.00101 0.42956
  • 1.8.4–1.9.7
CVE-2017-5934 Medium 6.1 CWE-79 0.00227 0.61567
  • 1.8.4–1.9.9
CVE-2020-15275 Medium 5.4 CWE-79 0.00081 0.36067
  • 1.8.4–1.9.10
CVE-2020-25074 High 9.8 CWE-22 0.01438 0.87083
  • 1.8.4–1.9.10
CVE-2010-0668 Medium 6.8 CWE-79 0.01194 0.85721
  • 1.8.4–1.9.1
CVE-2010-0669 High 7.5 CWE-79 0.01034 0.84468
  • 1.8.4–1.9.1
CVE-2010-0717 High 7.5 CWE-16, CWE-79 0.00639 0.79781
  • 1.8.4–1.8.6
CVE-2010-0828 Low 3.5 CWE-79 0.0018 0.56264
  • 1.8.4–1.9.2
CVE-2010-2487 Medium 4.3 CWE-79 0.00757 0.81666
  • 1.8.4–1.9.2
CVE-2011-1058 Low 2.6 CWE-79 0.00329 0.71694
  • 1.8.4–1.9.2
CVE-2012-4404 Medium 6 CWE-264, CWE-284 0.0044 0.75529
  • 1.9.0–1.9.4
CVE-2010-0667 Medium 5 CWE-200 0.00663 0.80246
  • 1.9.0
CVE-2010-2969 Medium 4.3 CWE-79 0.00342 0.72218
  • 1.9.0–1.9.2
CVE-2010-2970 Medium 4.3 CWE-79 0.00369 0.73288
  • 1.9.0–1.9.2

moin Vulnerability Remediation Guidance

CVE Description Full list of Impacted Versions Fix
CVE-2020-25074 The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution. 1.9.5, 1.9.10, 1.8.6, 1.9.3, 1.9.4, 1.9.0, 1.8.7, 1.8.4 (Show all) Patch → NO_SAFE_VERSION
CVE-2020-15275 MoinMoin is a wiki engine. In MoinMoin before version 1.9.11, an attacker with write permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki. Users are strongly advised to upgrade to a patched version. MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes. 1.9.5, 1.9.10, 1.8.6, 1.9.3, 1.9.4, 1.9.0, 1.8.7, 1.8.4 (Show all) Patch → NO_SAFE_VERSION
CVE-2017-5934 Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. 1.9.5, 1.8.6, 1.9.3, 1.9.4, 1.9.0, 1.8.7, 1.8.4, 1.9.7 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-9119 Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. 1.9.5, 1.8.6, 1.9.3, 1.9.4, 1.9.0, 1.8.7, 1.8.4, 1.9.7 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-7148 MoinMoin 1.9.8 allows remote attackers to conduct "JavaScript injection" attacks by using the "page creation" approach, related to a "Cross Site Scripting (XSS)" issue affecting the action=AttachFile (via page name) component. 1.9.5, 1.8.6, 1.9.3, 1.9.4, 1.9.0, 1.8.7, 1.8.4, 1.9.7 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-7146 MoinMoin 1.9.8 allows remote attackers to conduct "JavaScript injection" attacks by using the "page creation or crafted URL" approach, related to a "Cross Site Scripting (XSS)" issue affecting the action=fckdialog&dialog=attachment (via page name) component. 1.9.5, 1.8.6, 1.9.3, 1.9.4, 1.9.0, 1.8.7, 1.8.4, 1.9.7 (Show all) Patch → NO_SAFE_VERSION
CVE-2012-6495 Multiple directory traversal vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to overwrite arbitrary files via unspecified vectors. NOTE: this can be leveraged with CVE-2012-6081 to execute arbitrary code. 1.9.5, 1.8.6, 1.9.3, 1.9.4, 1.9.0, 1.8.7, 1.8.4, 1.9.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2012-6082 Cross-site scripting (XSS) vulnerability in the rsslink function in theme/__init__.py in MoinMoin 1.9.5 allows remote attackers to inject arbitrary web script or HTML via the page name in a rss link. 1.9.5, 1.8.6, 1.9.3, 1.9.4, 1.9.0, 1.8.7, 1.8.4, 1.9.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2012-6081 Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, as exploited in the wild in July 2012. 1.9.5, 1.8.6, 1.9.3, 1.9.4, 1.9.0, 1.8.7, 1.8.4, 1.9.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2012-6080 Directory traversal vulnerability in the _do_attachment_move function in the AttachFile action (action/AttachFile.py) in MoinMoin 1.9.3 through 1.9.5 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in a file name. 1.9.5, 1.9.3, 1.9.4 Patch → NO_SAFE_VERSION
CVE-2012-4404 security/__init__.py in MoinMoin 1.9 through 1.9.4 does not properly handle group names that contain virtual group names such as "All," "Known," or "Trusted," which allows remote authenticated users with virtual group membership to be treated as a member of the group. 1.9.3, 1.9.4, 1.9.0, 1.9.2, 1.9.1 Patch → NO_SAFE_VERSION
CVE-2011-1058 Cross-site scripting (XSS) vulnerability in the reStructuredText (rst) parser in parser/text_rst.py in MoinMoin before 1.9.3, when docutils is installed or when "format rst" is set, allows remote attackers to inject arbitrary web script or HTML via a javascript: URL in the refuri attribute. NOTE: some of these details are obtained from third party information. 1.8.6, 1.9.0, 1.8.7, 1.8.4, 1.9.2, 1.8.5, 1.9.1 Patch → NO_SAFE_VERSION
CVE-2010-2970 Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin 1.9.x before 1.9.3 allow remote attackers to inject arbitrary web script or HTML via crafted content, related to (1) action/SlideShow.py, (2) action/anywikidraw.py, and (3) action/language_setup.py, a similar issue to CVE-2010-2487. 1.9.0, 1.9.2, 1.9.1 Patch → NO_SAFE_VERSION
CVE-2010-2969 Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin 1.7.3 and earlier, and 1.9.x before 1.9.3, allow remote attackers to inject arbitrary web script or HTML via crafted content, related to (1) action/LikePages.py, (2) action/chart.py, and (3) action/userprofile.py, a similar issue to CVE-2010-2487. 1.9.0, 1.9.2, 1.9.1 Patch → NO_SAFE_VERSION
CVE-2010-2487 Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin 1.7.3 and earlier, 1.8.x before 1.8.8, and 1.9.x before 1.9.3 allow remote attackers to inject arbitrary web script or HTML via crafted content, related to (1) Page.py, (2) PageEditor.py, (3) PageGraphicalEditor.py, (4) action/CopyPage.py, (5) action/Load.py, (6) action/RenamePage.py, (7) action/backup.py, (8) action/login.py, (9) action/newaccount.py, and (10) action/recoverpass.py. 1.8.6, 1.9.0, 1.8.7, 1.8.4, 1.9.2, 1.8.5, 1.9.1 Patch → NO_SAFE_VERSION
CVE-2010-0828 Cross-site scripting (XSS) vulnerability in action/Despam.py in the Despam action module in MoinMoin 1.8.7 and 1.9.2 allows remote authenticated users to inject arbitrary web script or HTML by creating a page with a crafted URI. 1.8.6, 1.9.0, 1.8.7, 1.8.4, 1.9.2, 1.8.5, 1.9.1 Patch → NO_SAFE_VERSION
CVE-2010-0717 The default configuration of cfg.packagepages_actions_excluded in MoinMoin before 1.8.7 does not prevent unsafe package actions, which has unspecified impact and attack vectors. 1.8.6, 1.8.4, 1.8.5 Patch → NO_SAFE_VERSION
CVE-2010-0669 MoinMoin before 1.8.7 and 1.9.x before 1.9.2 does not properly sanitize user profiles, which has unspecified impact and attack vectors. 1.8.6, 1.9.0, 1.8.4, 1.8.5, 1.9.1 Patch → NO_SAFE_VERSION
CVE-2010-0668 Unspecified vulnerability in MoinMoin 1.5.x through 1.7.x, 1.8.x before 1.8.7, and 1.9.x before 1.9.2 has unknown impact and attack vectors, related to configurations that have a non-empty superuser list, the xmlrpc action enabled, the SyncPages action enabled, or OpenID configured. 1.8.6, 1.9.0, 1.8.4, 1.8.5, 1.9.1 Patch → NO_SAFE_VERSION
CVE-2010-0667 MoinMoin 1.9 before 1.9.1 does not perform the expected clearing of the sys.argv array in situations where the GATEWAY_INTERFACE environment variable is set, which allows remote attackers to obtain sensitive information via unspecified vectors. 1.9.0 Patch → NO_SAFE_VERSION
CVE-2008-1099 _macro_Getval in wikimacro.py in MoinMoin 1.5.8 and earlier does not properly enforce ACLs, which allows remote attackers to read protected pages. 1.9.11, 2.0.0b1, 2.0.0a1, 1.9.5, 1.9.10, 1.8.6, 1.9.3, 1.9.4 (Show all) Patch → NO_SAFE_VERSION
CVE-2008-1098 Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin 1.5.8 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) certain input processed by formatter/text_gedit.py (aka the gui editor formatter); (2) a page name, which triggers an injection in PageEditor.py when the page is successfully deleted by a victim in a DeletePage action; or (3) the destination page name for a RenamePage action, which triggers an injection in PageEditor.py when a victim's rename attempt fails because of a duplicate name. NOTE: the AttachFile XSS issue is already covered by CVE-2008-0781, and the login XSS issue is already covered by CVE-2008-0780. 1.9.11, 2.0.0b1, 2.0.0a1, 1.9.5, 1.9.10, 1.8.6, 1.9.3, 1.9.4 (Show all) Patch → NO_SAFE_VERSION
CVE-2008-0782 Directory traversal vulnerability in MoinMoin 1.5.8 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the MOIN_ID user ID in a cookie for a userform action. NOTE: this issue can be leveraged for PHP code execution via the quicklinks parameter. 1.9.11, 2.0.0b1, 2.0.0a1, 1.9.5, 1.9.10, 1.8.6, 1.9.3, 1.9.4 (Show all) Patch → NO_SAFE_VERSION
CVE-2008-0781 Multiple cross-site scripting (XSS) vulnerabilities in action/AttachFile.py in MoinMoin 1.5.8 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) message, (2) pagename, and (3) target filenames. 1.9.11, 2.0.0b1, 2.0.0a1, 1.9.5, 1.9.10, 1.8.6, 1.9.3, 1.9.4 (Show all) Patch → NO_SAFE_VERSION

Instantly see if these moin vulnerabilities affect your code.

Scan for Free