Moderate severityNVD Advisory· Published Feb 22, 2011· Updated Apr 29, 2026
CVE-2011-1058
CVE-2011-1058
Description
Cross-site scripting (XSS) vulnerability in the reStructuredText (rst) parser in parser/text_rst.py in MoinMoin before 1.9.3, when docutils is installed or when "format rst" is set, allows remote attackers to inject arbitrary web script or HTML via a javascript: URL in the refuri attribute. NOTE: some of these details are obtained from third party information.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
moinPyPI | < 1.9.3 | 1.9.3 |
Affected products
76cpe:2.3:a:moinmo:moinmoin:*:*:*:*:*:*:*:*+ 75 more
- cpe:2.3:a:moinmo:moinmoin:*:*:*:*:*:*:*:*range: <=1.9.2
- cpe:2.3:a:moinmo:moinmoin:0.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.10:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.11:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.2:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.7:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.8:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.3.5:rc1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.0:beta5:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.0:beta6:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.3:rc2:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.5:a:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.5a:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.5:rc1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.8.8:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:moinmo:moinmoin:1.9.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
22- moinmo.in/SecurityFixesnvdPatchVendor AdvisoryWEB
- secunia.com/advisories/43413nvdVendor Advisory
- www.vupen.com/english/advisories/2011/0455nvdVendor Advisory
- github.com/advisories/GHSA-m9j7-xcj7-42j9ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2011-1058ghsaADVISORY
- hg.moinmo.in/moin/1.9/rev/97208f67798fghsaWEB
- lists.fedoraproject.org/pipermail/package-announce/2011-March/054544.htmlnvdWEB
- lists.fedoraproject.org/pipermail/package-announce/2011-March/055116.htmlnvdWEB
- lists.fedoraproject.org/pipermail/package-announce/2011-March/055124.htmlnvdWEB
- www.debian.org/security/2011/dsa-2321nvdWEB
- www.ubuntu.com/usn/USN-1604-1nvdWEB
- exchange.xforce.ibmcloud.com/vulnerabilities/65545nvdWEB
- github.com/pypa/advisory-database/tree/main/vulns/moin/PYSEC-2011-6.yamlghsaWEB
- web.archive.org/web/20140720123341/http://secunia.com/advisories/50885ghsaWEB
- web.archive.org/web/20140721222129/http://secunia.com/advisories/43665ghsaWEB
- web.archive.org/web/20140802163629/http://secunia.com/advisories/43413ghsaWEB
- web.archive.org/web/20201202035105/http://www.securityfocus.com/bid/46476ghsaWEB
- secunia.com/advisories/43665nvd
- secunia.com/advisories/50885nvd
- www.securityfocus.com/bid/46476nvd
- www.vupen.com/english/advisories/2011/0571nvd
- www.vupen.com/english/advisories/2011/0588nvd
News mentions
0No linked articles in our index yet.