Bugtraq mailing list archives
Re: Serendipity 'serendipity[filter][bp.ALT]' Cross-Site Scripting vulnerability
From: Henri Salo <henri () nerv fi>
Date: Thu, 1 Dec 2011 19:49:41 +0200
On Wed, Nov 02, 2011 at 08:40:35PM +0000, sschurtz () t-online de wrote:
Advisory: Serendipity 'serendipity[filter][bp.ALT]' Cross-Site Scripting vulnerability Advisory ID: SSCHADV2011-015 Author: Stefan Schurtz Affected Software: Successfully tested on Serendipity 1.5.5 Vendor URL: http://www.s9y.org Vendor Status: fixed CVE-ID: - ========================== Vulnerability Description: ========================== The parameter "serendipity[filter][bp.ALT]" in Serendipity backend is prone to a Cross-Site Scripting vulnerability ================== Technical Details: ================== http://<target>/serendipity/serendipity_admin_image_selector.php?serendipity[filter][bp.ALT]=</script><script>alert(document.cookie)</script>&go=+-+Go!+-+ ========= Solution: ========= Upgrade to Serendipity 1.6 ==================== Disclosure Timeline: ==================== 22-Sep-2011 - informed developers 27-Oct-2011 - fixed by vendor 02-Nov-2011 - release date of this security advisory ======== Credits: ======== Vulnerability found and advisory written by Stefan Schurtz. =========== References: =========== http://www.s9y.org http://blog.s9y.org/archives/233-Serendipity-1.6-released.html http://www.rul3z.de/advisories/SSCHADV2011-015.txt
CVE-2011-4365 - Henri Salo
Current thread:
- Re: Serendipity 'serendipity[filter][bp.ALT]' Cross-Site Scripting vulnerability Henri Salo (Dec 01)