Gentoo Archives: gentoo-announce

From: Pierre-Yves Rofes <py@g.o>
To: gentoo-announce@l.g.o
Cc: full-disclosure@××××××××××××××.uk, bugtraq@×××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200803-27 ] MoinMoin: Multiple vulnerabilities
Date: Tue, 18 Mar 2008 22:40:16
Message-Id: 47E051E9.9050305@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200803-27
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org/
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: Normal
11 Title: MoinMoin: Multiple vulnerabilities
12 Date: March 18, 2008
13 Bugs: #209133
14 ID: 200803-27
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 Several vulnerabilities have been reported in MoinMoin Wiki Engine.
22
23 Background
24 ==========
25
26 MoinMoin is an advanced, easy to use and extensible Wiki Engine.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 www-apps/moinmoin < 1.6.1 >= 1.6.1
35
36 Description
37 ===========
38
39 Multiple vulnerabilities have been discovered:
40
41 * A vulnerability exists in the file wikimacro.py because the
42 _macro_Getval function does not properly enforce ACLs
43 (CVE-2008-1099).
44
45 * A directory traversal vulnerability exists in the userform action
46 (CVE-2008-0782).
47
48 * A Cross-Site Scripting vulnerability exists in the login action
49 (CVE-2008-0780).
50
51 * Multiple Cross-Site Scripting vulnerabilities exist in the file
52 action/AttachFile.py when using the message, pagename, and target
53 filenames (CVE-2008-0781).
54
55 * Multiple Cross-Site Scripting vulnerabilities exist in
56 formatter/text_gedit.py (aka the gui editor formatter) which can be
57 exploited via a page name or destination page name, which trigger an
58 injection in the file PageEditor.py (CVE-2008-1098).
59
60 Impact
61 ======
62
63 These vulnerabilities can be exploited to allow remote attackers to
64 inject arbitrary web script or HTML, overwrite arbitrary files, or read
65 protected pages.
66
67 Workaround
68 ==========
69
70 There is no known workaround at this time.
71
72 Resolution
73 ==========
74
75 All MoinMoin users should upgrade to the latest version:
76
77 # emerge --sync
78 # emerge --ask --oneshot --verbose ">=www-apps/moinmoin-1.6.1"
79
80 References
81 ==========
82
83 [ 1 ] CVE-2008-0780
84 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0780
85 [ 2 ] CVE-2008-0781
86 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0781
87 [ 3 ] CVE-2008-0782
88 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0782
89 [ 4 ] CVE-2008-1098
90 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1098
91 [ 5 ] CVE-2008-1099
92 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1099
93
94 Availability
95 ============
96
97 This GLSA and any updates to it are available for viewing at
98 the Gentoo Security Website:
99
100 http://security.gentoo.org/glsa/glsa-200803-27.xml
101
102 Concerns?
103 =========
104
105 Security is a primary focus of Gentoo Linux and ensuring the
106 confidentiality and security of our users machines is of utmost
107 importance to us. Any security concerns should be addressed to
108 security@g.o or alternatively, you may file a bug at
109 http://bugs.gentoo.org.
110
111 License
112 =======
113
114 Copyright 2008 Gentoo Foundation, Inc; referenced text
115 belongs to its owner(s).
116
117 The contents of this document are licensed under the
118 Creative Commons - Attribution / Share Alike license.
119
120 http://creativecommons.org/licenses/by-sa/2.5
121 -----BEGIN PGP SIGNATURE-----
122 Version: GnuPG v2.0.7 (GNU/Linux)
123 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
124
125 iD8DBQFH4FHpuhJ+ozIKI5gRAqdaAJ4ijowvwqZ9z8fIR7s0gZxersiShgCePUVN
126 O2YbvIA+/t8KHnm8ZkSiNyY=
127 =V5jt
128 -----END PGP SIGNATURE-----
129 --
130 gentoo-announce@l.g.o mailing list