lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 7 Jan 2016 18:06:51 +0200 From: Onur Yilmaz <onur@...sparker.com> To: fulldisclosure@...lists.org, cert@...t.org, vuln@...unia.com, bugs@...uritytracker.com, submissions@...ketstormsecurity.org, bugtraq@...urityfocus.com Subject: [FD] Serendipity Security Advisory - XSS Vulnerability - CVE-2015-8603 Information -------------------- Advisory by Netsparker Name: XSS Vulnerability in Serendipity Affected Software : Serendipity Affected Versions: v2.0.2 and possibly below Vendor Homepage : http://www.s9y.org Vulnerability Type : Cross-site Scripting Severity : Important Status : Fixed CVE-ID : CVE-2015-8603 Netsparker Advisory Reference : NS-15-024 Description -------------------- By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged in user’s session. This means that the malicious hacker can change the logged in user’s password and invalidate the session of the victim while the hacker maintains access. As seen from the XSS example in this article, if a web application is vulnerable to cross-site scripting and the administrator’s session is hijacked, the malicious hacker exploiting the vulnerability will have full admin privileges on that web application. Technical Details -------------------- Proof of Concept URL for XSS in Serendipity v2.0.2: /serendipity/serendipity_admin.php?serendipity[action]=admin&serendipity[adminModule]=comments&serendipity[adminAction]=edit&serendipity[id]=2&serendipity[entry_id]='"--></style></scRipt><scRipt>alert(0x000EEA)</scRipt> For more information on cross-site scripting vulnerabilities read the following article on Cross-site Scripting (XSS) - https://www.netsparker.com/web-vulnerability-scanner/vulnerability-security-checks-index/crosssite-scripting-xss/ Advisory Timeline -------------------- 07/12/2015 - First Contact 17/12/2015 - Vendor Fixed 05/01/2016 - Advisory Released Solution -------------------- http://blog.s9y.org/archives/266-Serendipity-2.0.3-released.html Credits & Authors -------------------- These issues have been discovered by Selçuk Miynat while testing Netsparker Web Application Security Scanner - https://www.netsparker.com/web-vulnerability-scanner/ About Netsparker -------------------- Netsparker web application security scanners find and report security flaws and vulnerabilities such as SQL Injection and Cross-site Scripting (XSS) in all websites and web applications, regardless of the platform and technology they are built on. Netsparker scanning engine’s unique detection and exploitation techniques allow it to be dead accurate in reporting vulnerabilities. The Netsparker web application security scanner is available in two editions; Netsparker Desktop and Netsparker Cloud. Visit our website https://www.netsparker.com for more information. Onur Yılmaz - National General Manager Netsparker Web Application Security Scanner T: +90 (0)554 873 0482 _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists