lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <201111022040.pA2KeZg9012241@sf01web1.securityfocus.com> Date: Wed, 2 Nov 2011 20:40:35 GMT From: sschurtz@...nline.de To: bugtraq@...urityfocus.com Subject: Serendipity 'serendipity[filter][bp.ALT]' Cross-Site Scripting vulnerability Advisory: Serendipity 'serendipity[filter][bp.ALT]' Cross-Site Scripting vulnerability Advisory ID: SSCHADV2011-015 Author: Stefan Schurtz Affected Software: Successfully tested on Serendipity 1.5.5 Vendor URL: http://www.s9y.org Vendor Status: fixed CVE-ID: - ========================== Vulnerability Description: ========================== The parameter "serendipity[filter][bp.ALT]" in Serendipity backend is prone to a Cross-Site Scripting vulnerability ================== Technical Details: ================== http://<target>/serendipity/serendipity_admin_image_selector.php?serendipity[filter][bp.ALT]=</script><script>alert(document.cookie)</script>&go=+-+Go!+-+ ========= Solution: ========= Upgrade to Serendipity 1.6 ==================== Disclosure Timeline: ==================== 22-Sep-2011 - informed developers 27-Oct-2011 - fixed by vendor 02-Nov-2011 - release date of this security advisory ======== Credits: ======== Vulnerability found and advisory written by Stefan Schurtz. =========== References: =========== http://www.s9y.org http://blog.s9y.org/archives/233-Serendipity-1.6-released.html http://www.rul3z.de/advisories/SSCHADV2011-015.txt
Powered by blists - more mailing lists