Cross-site scripting (XSS) vulnerability in the reStructuredText (rst) parser in parser/text_rst.py in MoinMoin before 1.9.3, when docutils is installed or when "format rst" is set, allows remote attackers to inject arbitrary web script or HTML via a javascript: URL in the refuri attribute. NOTE: some of these details are obtained from third party information.
https://exchange.xforce.ibmcloud.com/vulnerabilities/65545
http://www.vupen.com/english/advisories/2011/0588
http://www.vupen.com/english/advisories/2011/0571
http://www.vupen.com/english/advisories/2011/0455
http://www.ubuntu.com/usn/USN-1604-1
http://www.securityfocus.com/bid/46476
http://www.debian.org/security/2011/dsa-2321
http://secunia.com/advisories/50885
http://secunia.com/advisories/43665
http://secunia.com/advisories/43413
http://moinmo.in/SecurityFixes
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055124.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055116.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054544.html
Published: 2011-02-22
Updated: 2025-04-11
Base Score: 2.6
Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N
Severity: Low
Base Score: 6.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Severity: Medium
Base Score: 5.1
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
Severity: Medium