Cross-site scripting (XSS) vulnerability in the reStructuredText (rst) parser in parser/text_rst.py
in MoinMoin before 1.9.3, when docutils is installed or when “format rst” is set, allows remote attackers to inject arbitrary web script or HTML via a javascript: URL in the refuri attribute. NOTE: some of these details are obtained from third party information.
hg.moinmo.in/moin/1.9/rev/97208f67798f
lists.fedoraproject.org/pipermail/package-announce/2011-March/054544.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/055116.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/055124.html
moinmo.in/SecurityFixes
www.debian.org/security/2011/dsa-2321
www.ubuntu.com/usn/USN-1604-1
exchange.xforce.ibmcloud.com/vulnerabilities/65545
github.com/advisories/GHSA-m9j7-xcj7-42j9
nvd.nist.gov/vuln/detail/CVE-2011-1058
web.archive.org/web/20140720123341/secunia.com/advisories/50885
web.archive.org/web/20140721222129/secunia.com/advisories/43665
web.archive.org/web/20140802163629/secunia.com/advisories/43413
web.archive.org/web/20201202035105/www.securityfocus.com/bid/46476