|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 4318-1 (moin - security update)|
|Summary:||Nitin Venkatesh discovered a cross-site scripting vulnerability in moin,;a Python clone of WikiWiki. A remote attacker can conduct cross-site;scripting attacks via the GUI editor's link dialogue. This only affects;installations which have set up fckeditor (not enabled by default).|
Nitin Venkatesh discovered a cross-site scripting vulnerability in moin,
a Python clone of WikiWiki. A remote attacker can conduct cross-site
scripting attacks via the GUI editor's link dialogue. This only affects
installations which have set up fckeditor (not enabled by default).
A WikiWikiWeb is a collaborative hypertext environment, with an
emphasis on easy access to and modification of information. MoinMoin
is a Python WikiClone that allows you to easily set up your own wiki,
only requiring a Web server and a Python installation.
moin on Debian Linux
For the stable distribution (stretch), this problem has been fixed in
We recommend that you upgrade your moin packages.
For the detailed security status of moin please refer to its security
tracker page at:
Common Vulnerability Exposure (CVE) ID: CVE-2017-5934|
Debian Security Information: DSA-4318 (Google Search)
SuSE Security Announcement: openSUSE-SU-2018:3105 (Google Search)
|Copyright||Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net|
|This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.