CVE-2020-15275 – moin
Package
Manager: pip
Name: moin
Vulnerable Version: >=0 <1.9.11
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N
EPSS: 0.00312 pctl0.53834
Details
malicious SVG attachment causing stored XSS vulnerability ### Impact An attacker with `write` permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki. ### Patches Users are strongly advised to upgrade to a patched version. MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes. ### Workarounds It is not advised to work around this, but to upgrade MoinMoin to a patched version. That said, a work around via a Content Security Policy in the web server might be possible. Also, it is of course helpful if you give `write` permissions (which include uploading attachments) only to trusted users. ### For more information If you have any questions or comments about this advisory, email me at [twaldmann@thinkmo.de](mailto:twaldmann@thinkmo.de). ### Credits This vulnerability was discovered by: Catarina Leite from the Checkmarx SCA AppSec team
Metadata
Created: 2020-11-11T15:54:41Z
Modified: 2024-10-07T15:01:08Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/11/GHSA-4q96-6xhq-ff43/GHSA-4q96-6xhq-ff43.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-4q96-6xhq-ff43
Finding: F425
Auto approve: 1