{"type": "seebug", "viewCount": 6, "enchantments": {"score": {"value": 7.1, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 7.1}, "reporter": "Root", "title": "S9Y Serendipity 1.3 - Referer HTTP Header XSS", "cvelist": [], "bulletinFamily": "exploit", "sourceHref": "https://www.seebug.org/vuldb/ssvid-85000", "cvss": {"score": 0.0, "vector": "NONE"}, "references": [], "enchantments_done": [], "modified": "2014-07-01T00:00:00", "description": "No description provided by source.", "href": "https://www.seebug.org/vuldb/ssvid-85000", "id": "SSV:85000", "status": "cve,poc", "lastseen": "2017-11-19T13:30:08", "sourceData": "\n source: http://www.securityfocus.com/bid/28885/info\r\n\r\nS9Y Serendipity is prone to an HTML-injection vulnerability and multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.\r\n\r\nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials, control how the site is rendered to the user, or launch other attacks.\r\n\r\nS9Y Serendipity 1.3 is vulnerable; other versions may also be affected.\r\n\r\nThe following proof of concept is available for the referrer issue:\r\n\r\nwget --referer='http://<hr onMouseOver="alert(7)">' http://someblog.com/ \n ", "published": "2014-07-01T00:00:00", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645349136, "score": 1683876389, "epss": 1678848988}, "_internal": {"score_hash": "c53787ced29cbb1f630d33759deaac66"}}