CVE-2010-1238

Priority
Low
Description
MoinMoin 1.7.1 allows remote attackers to bypass the textcha protection
mechanism by modifying the textcha-question and textcha-answer fields to
have empty values.
References
Notes
jdstrand> at least 1.8.2 and higher are not affected
Assigned-to
jdstrand
Package
Source: moin (LP Ubuntu Debian)
Upstream:released (1.8.2)
Ubuntu 8.04 LTS (Hardy Heron):not-affected (code-not-present)
Ubuntu 10.04 LTS (Lucid Lynx):not-affected
Patches:
Upstream:http://hg.moinmo.in/moin/1.7/rev/a952d07dea69
More Information

Valid XHTML 1.0 Strict

Updated: 2012-06-01 15:20:51 UTC (commit 5347)