lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <PS1PR04MB1001DA98C101EEED056F4A4FDF0F0@PS1PR04MB1001.apcprd04.prod.outlook.com>
Date: Sat, 8 Apr 2017 09:39:31 +0000
From: Wester 95 <evilzyzeng@...look.com>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: [FD] CVE-Request:stored XSS in Serendipity v2.1-rc1 allows attacker steals admin’s cookie and other informations

Hi team,

I would like to request one CVE id for this, thank you!



Details

======


Software: s9y Serendipity

Version: 2.1-rc1

Homepage: https://docs.s9y.org/


=======


Description

================


stored XSS in Serendipity v2.1-rc1 allows attacker steals admin’s cookie and other informations


===========


POC

==========


1.login as a common editor user


2.open a new entry ,then write:


<img src=1 onerror=alert(document.cookie)>


post it!

2.then when admin view it,XSS attack will occur!


=========


Fixed

========


https://github.com/s9y/Serendipity/issues/456


========


Best regards,


Zhiyang Zeng of Tencent security platform department



_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ