CVE-2020-15275: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
(updated )
MoinMoin is a wiki engine. In MoinMoin, an attacker with write permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user’s browser when the user is viewing that SVG file on the wiki. Users are strongly advised to upgrade to a patched version. MoinMoin Wiki has the necessary fixes and also contains other important fixes.
References
- advisory.checkmarx.net/advisory/CX-2020-4285
- github.com/advisories/GHSA-4q96-6xhq-ff43
- github.com/moinwiki/moin-1.9/commit/31de9139d0aabc171e94032168399b4a0b2a88a2
- github.com/moinwiki/moin-1.9/releases/tag/1.9.11
- github.com/moinwiki/moin-1.9/security/advisories/GHSA-4q96-6xhq-ff43
- nvd.nist.gov/vuln/detail/CVE-2020-15275
- pypi.org/project/moin/
Detect and mitigate CVE-2020-15275 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →