Home page logo

oss-sec logo oss-sec mailing list archives

RE: CVE-request: Serendipity 'serendipity[filter][bp.ALT]' Cross-Site Scripting vulnerability
From: "Secunia Research" <vuln () secunia com>
Date: Thu, 1 Dec 2011 14:13:16 +0100


The GIT commit referenced by the Secunia advisory [1] is the correct fix for
this issue.

The fix removed a line in the code that displayed an unsanitised variable in
one of the template files. This variable was inside a JavaScript comment
block, but this does not prevent exploitation when the payload is prefixed
with a </script> tag.



Med venlig hilsen / Kind Regards,
Jon Butler
Junior Security Specialist
Mikado House
Rued Langgaardsvej 8
2300 Copenhagen S

Phone +45 3338 5726

Please visit our corporate website:
Follow us on Twitter:

-----Original Message-----
From: Henri Salo [mailto:henri () nerv fi] 
Sent: 1. december 2011 10:59
To: oss-security () lists openwall com
Subject: [oss-security] CVE-request: Serendipity
'serendipity[filter][bp.ALT]' Cross-Site Scripting vulnerability

Original post: http://seclists.org/bugtraq/2011/Nov/15
Advisory URL: http://www.rul3z.de/advisories/SSCHADV2011-015.txt
New version announcement:

I contacted Garvin Hicking and he said this is indeed fixed in 1.6 code, but
they changed from SVN to Git so can't really refer to proper commit. Secunia
is linking in http://secunia.com/advisories/46666/ to
ad4711, which has nothing to do with the actual issue. Shame on Secunia.

This is one of logs, which can act like proof:

Please notify me if this is not enough information.

- Henri Salo

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]