Lucene search

K
openvasCopyright (c) 2010 Greenbone Networks GmbHOPENVAS:801307
HistoryApr 13, 2010 - 12:00 a.m.

MoinMoin 'Despam' Action Cross-Site Scripting Vulnerability

2010-04-1300:00:00
Copyright (c) 2010 Greenbone Networks GmbH
plugins.openvas.org
13

0.002 Low

EPSS

Percentile

55.2%

This host is running MoinMoin Wiki and is prone to Cross-Site
Scripting vulnerability.

###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_moinmoin_wiki_xss_vuln.nasl 5306 2017-02-16 09:00:16Z teissa $
#
# MoinMoin 'Despam' Action Cross Site Scripting Vulnerability
#
# Authors:
# Antu Sanadi <[email protected]>
#
# Copyright:
# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

tag_impact = "Successful exploitation will allow attackers to execute arbitrary scripting
  code.
  Impact Level: Application";
tag_affected = "MoinMoin Wiki version 1.8.7 and 1.9.2";
tag_insight = "Input passed via the 'page' name which is not properly sanitising before being
  returned to the user in 'Despam.py'. This can be exploited to insert arbitrary
  HTML and script code, when the Despam functionality is used on a page with a
  specially crafted page name.";
tag_solution = "Upgrade MoinMoin Wiki 1.9.2-3 or latest,
  For updates refer to http://moinmo.in/MoinMoinDownload";
tag_summary = "This host is running MoinMoin Wiki and is prone to Cross-Site
  Scripting vulnerability.";

if(description)
{
  script_id(801307);
  script_version("$Revision: 5306 $");
  script_tag(name:"last_modification", value:"$Date: 2017-02-16 10:00:16 +0100 (Thu, 16 Feb 2017) $");
  script_tag(name:"creation_date", value:"2010-04-13 16:55:19 +0200 (Tue, 13 Apr 2010)");
  script_cve_id("CVE-2010-0828");
  script_bugtraq_id(39110);
  script_tag(name:"cvss_base", value:"3.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:S/C:N/I:P/A:N");
  script_name("MoinMoin 'Despam' Action Cross-Site Scripting Vulnerability");
  script_xref(name : "URL" , value : "http://seclists.org/oss-sec/");
  script_xref(name : "URL" , value : "http://secunia.com/advisories/39188");
  script_xref(name : "URL" , value : "https://bugzilla.redhat.com/show_bug.cgi?id=578801");
  script_xref(name : "URL" , value : "http://comments.gmane.org/gmane.comp.security.oss.general/2773");

  script_tag(name:"qod_type", value:"remote_banner");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (c) 2010 Greenbone Networks GmbH");
  script_family("Web application abuses");
  script_dependencies("gb_moinmoin_wiki_detect.nasl");
  script_require_ports("Services/www", 80);
  script_tag(name : "impact" , value : tag_impact);
  script_tag(name : "affected" , value : tag_affected);
  script_tag(name : "insight" , value : tag_insight);
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "summary" , value : tag_summary);
  exit(0);
}


include("http_func.inc");
include("version_func.inc");

moinWikiPort = get_http_port(default:80);
if(!moinWikiPort){
  exit(0);
}

## Get MoinMoin Wiki Version from KB
moinWikiVer = get_kb_item("www/" + moinWikiPort + "/moinmoinWiki");
moinWikiVer = eregmatch(pattern:"^(.+) under (/.*)$", string:moinWikiVer);

if(moinWikiVer[1] != NULL)
{
  ## Check for version 1.8.7
  if(version_is_equal(version:moinWikiVer[1], test_version:"1.8.7") ||
     version_is_equal(version:moinWikiVer[1], test_version:"1.9.2")){
    security_message(moinWikiPort);
  }
}