• Home
  • References
  • Wiki
  • About me
  • Imprint

Sep 25: SSCHADV2011-016 - Serendipity freetag plugin 'serendipity[tagview]' Cross-Site Scripting vulnerability

Advisory:
Serendipity freetag plugin ‘serendipity[tagview]’ Cross-Site Scripting vulnerability
Advisory ID: SSCHADV2011-016
Author:
Stefan Schurtz
Affected Software: Successfully tested on Serendipity 1.5.5
Vendor URL:
http://www.s9y.org
Vendor Status: fixed
CVE-ID: -
 
======================
Vulnerability Description:
======================

The freetag plugin
parameter "serendipity[tagview]" in Serendipity backend is prone to a Cross-Site Scripting vulnerability
 
==============
Technical Details:
==============
 
http://<target>/serendipity/serendipity_admin?serendipity[adminModule]=event_display&serendipity[adminAction]=managetags&serendipity[tagview]=<script>alert(document.cookie)</script>
 
=====
Solution:
=====

Update to the latest version

================
Disclosure Timeline:
================

22-Sep-2011 – informed developers
23-Sep-2011 – fixed in the latest version
25-Sep-2011 – release date of this security advisory
25-Sep-2011 – post on BugTraq

====
Credits:
====

Vulnerability found and advisory written by Stefan Schurtz.

=======
References:
=======

http://www.s9y.org
http://www.securityfocus.com/archive/1/519814/30/0/threaded
http://secunia.com/advisories/46166/
http://www.rul3z.de/advisories/SSCHADV2011-016.txt
Geschrieben von Stefan Schurtz in Security Advisories Kommentare: (0) Trackbacks: (0)
Tags für diesen Artikel: advisory, security, sicherheit, xss
Zuletzt bearbeitet am 27.09.2011 20:46

Trackbacks
Trackback-URL für diesen Eintrag

Keine Trackbacks

Kommentare
Ansicht der Kommentare: (Linear | Verschachtelt)

Noch keine Kommentare


Kommentar schreiben


Um maschinelle und automatische Übertragung von Spamkommentaren zu verhindern, bitte die Zeichenfolge im dargestellten Bild in der Eingabemaske eintragen. Nur wenn die Zeichenfolge richtig eingegeben wurde, kann der Kommentar angenommen werden. Bitte beachten Sie, dass Ihr Browser Cookies unterstützen muss, um dieses Verfahren anzuwenden.
CAPTCHA 1CAPTCHA 2CAPTCHA 3CAPTCHA 4CAPTCHA 5


Textile-Formatierung erlaubt
Sie können [geshi lang=LANG][/lang] Tags verwenden um Quellcode abhängig von der gewählten Programmiersprache einzubinden
 
 

Kalender

Zurück April '18
Mo Tu We Th Fr Sa Su
            1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30            

Kategorien

  • XML Allgemein (3)
  • XML Bug Bounty (6)
  • XML Cisco (12)
  • XML Coding (37)
  • XML Fachartikel (5)
  • XML Forensics (2)
  • XML Hacking Challenge (5)
  • XML IT-Security (49)
  • XML Kryptographie (8)
  • XML Network Monitoring (8)
  • XML OpenBSD (12)
  • XML Reverse Engineering (1)
  • XML Security Advisories (99)
  • XML Steganographie (6)

Alle Kategorien
The Open Web Application Security Project

taggs

xml ACL xml advisory xml apple.com xml artikel xml backdoor xml buffer overflow xml bug bounty xml bypass xml challenges xml cheat sheet xml check point xml Cisco xml coding xml cross site request forgery xml cross site scripting xml dcfldd xml directory traversal xml diskinternals xml dos xml forensics xml full path disclosure xml heise xml html5 xml http xml HTTPS xml infoserve xml IPv6 xml lfi xml linux reader xml markplaats.nl xml metasploit xml nagios xml nessus xml omniture xml OpenBSD xml open redirection xml OpenSSH xml owasp xml reverse engineering xml RIPv2 xml saar xml saarland xml security xml Sicherheit xml SNMP xml sql injection xml steganographie xml store.apple.com xml sven xml xss

Exploit-DB updates by Offensive Security

[webapps] Joomla Convert Forms version 2.0.3 - Formula Injection (CSV Injection)

Thursday, April 12. 2018
[remote] F5 BIG-IP 11.6 SSL Virtual Server - 'Ticketbleed' Memory Disclosure

Tuesday, February 14. 2017
[shellcode] Linux/x64 - x64 Assembly Shellcode (Generator)

Wednesday, April 11. 2018
[webapps] WordPress Plugin File Upload 4.3.3 - Stored Cross-Site Scripting (PoC)

Tuesday, April 10. 2018
[webapps] WordPress Plugin File Upload 4.3.2 - Stored Cross-Site Scripting

Tuesday, April 10. 2018

OpenBSD Journal

OpenBSD Community Goes Gold for 2018!

Thursday, April 19. 2018
Hardware accelerated AES/HMAC-SHA on octeons

Wednesday, April 18. 2018
Transparent network audio with mpd & sndiod

Tuesday, April 10. 2018
OpenBSD 6.3 Released

Monday, April 2. 2018
Stack-register Checking

Saturday, March 10. 2018
Mike Larkin at bhyvecon 2018:

Friday, March 9. 2018
syspatches will be provided for both supported releases

Thursday, March 8. 2018
a2k18 Hackathon Report: Ken Westerback on dhclient and more

Friday, March 2. 2018

Blog abonnieren

  • XML RSS 0.91 feed
  • XML RSS 1.0 feed
  • XML RSS 2.0 feed
  • ATOM/XML ATOM 0.3 feed
  • ATOM/XML ATOM 1.0 feed
  • XML RSS 2.0 Kommentare

Archiv

  • April 2018 (0)
  • March 2018 (0)
  • February 2018 (0)
  • Das Neueste ...
  • Älteres ...

Verwaltung des Blogs

Login
 

Layout by Andreas Viklund | Serendipity template by Carl