Lucene search

K

serendipity-xss.txt

πŸ—“οΈΒ 11 Dec 2007Β 00:00:00Reported byΒ Hanno BoeckTypeΒ 
packetstorm
Β packetstorm
πŸ”—Β packetstormsecurity.comπŸ‘Β 25Β Views

Cross site scripting (XSS) in Serendipity 1.

Show more
Related
Code
ReporterTitlePublishedViews
Family
Cvelist
CVE-2007-6205
11 Dec 200720:00
–cvelist
UbuntuCve
CVE-2007-6205
11 Dec 200700:00
–ubuntucve
Prion
Cross site scripting
11 Dec 200720:46
–prion
NVD
CVE-2007-6205
11 Dec 200720:46
–nvd
CVE
CVE-2007-6205
11 Dec 200720:46
–cve
OpenVAS
Debian Security Advisory DSA 1528-1 (serendipity)
27 Mar 200800:00
–openvas
OpenVAS
Debian: Security Advisory (DSA-1528-1)
27 Mar 200800:00
–openvas
securityvulns
Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
24 Mar 200800:00
–securityvulns
securityvulns
[SECURITY] [DSA 1528-1] New serendipity packages fix cross site scripting
24 Mar 200800:00
–securityvulns
Debian
[SECURITY] [DSA 1528-1] New serendipity packages fix cross site scripting
24 Mar 200816:38
–debian
Rows per page
`Source: http://www.int21.de/cve/CVE-2007-6205-s9y.html  
  
Cross site scripting (XSS) in rss feed plugin of Serendipity 1.2  
  
References  
http://www.s9y.org/  
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6205  
  
Description  
The Serendipity blog system contains a plugin to display the content of feeds   
in the sidebar (serendipity_plugin_remoterss). If an attacker can modify the   
RSS feed, it's possible to inject javascript code in the link part, because   
it's not correctly escaped.  
  
Sample code  
Sample feed injecting code:  
<rss version="2.0">  
<channel><item><title>foo</title>  
<link>" onMouseOver="alert(1)</link></item></channel>  
</rss>  
  
Workaround/Fix  
Serendipity developers have fixed this in svn and all further version, please   
update to 1.2.1 or above.  
  
CVE Information  
The Common Vulnerabilities and Exposures (CVE) project has assigned the name   
CVE-2007-6205 to this issue. This is a candidate for inclusion in the CVE   
list (http://cve.mitre.org/), which standardizes names for security problems.  
  
Credits and copyright  
This vulnerability was discovered by Hanno Boeck of schokokeks.org webhosting.   
It's licensed under the creative commons attribution license.  
  
Hanno Boeck, 2007-12-05, http://www.hboeck.de  
  
--   
Hanno BΓΆck Blog: http://www.hboeck.de/  
GPG: 3DBD3B20 Jabber/Mail: [email protected]  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
11 Dec 2007 00:00Current
6.5Medium risk
Vulners AI Score6.5
EPSS0.00585
25
.json
Report