Cross site scripting (XSS) in rss feed plugin of Serendipity 1.2

Credit: Hanno Boeck
Risk: Low
Local: No
Remote: Yes

CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Source: Cross site scripting (XSS) in rss feed plugin of Serendipity 1.2 References Description The Serendipity blog system contains a plugin to display the content of feeds in the sidebar (serendipity_plugin_remoterss). If an attacker can modify the RSS feed, it's possible to inject javascript code in the link part, because it's not correctly escaped. Sample code Sample feed injecting code: <rss version="2.0"> <channel><item><title>foo</title> <link>" onMouseOver="alert(1)</link></item></channel> </rss> Workaround/Fix Serendipity developers have fixed this in svn and all further version, please update to 1.2.1 or above. CVE Information The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2007-6205 to this issue. This is a candidate for inclusion in the CVE list (, which standardizes names for security problems. Credits and copyright This vulnerability was discovered by Hanno Boeck of webhosting. It's licensed under the creative commons attribution license. Hanno Boeck, 2007-12-05, -- Hanno B??ck Blog: GPG: 3DBD3B20 Jabber/Mail: hanno (at) hboeck (dot) de [email concealed] -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.7 (GNU/Linux) iD8DBQBHXUbOr2QksT29OyARAj+uAJ9ULuWOiqqhSpGxJrFXwCSf4buriQCgitjF +9ZdBT/STceu1MeHdgrlsrM= =tdpM -----END PGP SIGNATURE-----

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021,


Back to Top