oss-sec mailing list archives
Re: CVE-request: Serendipity 'serendipity[filter][bp.ALT]' Cross-Site Scripting vulnerability
From: Henri Salo <henri () nerv fi>
Date: Thu, 1 Dec 2011 16:14:28 +0200
On Thu, Dec 01, 2011 at 02:13:16PM +0100, Secunia Research wrote:
Henri, The GIT commit referenced by the Secunia advisory [1] is the correct fix for this issue. The fix removed a line in the code that displayed an unsanitised variable in one of the template files. This variable was inside a JavaScript comment block, but this does not prevent exploitation when the payload is prefixed with a </script> tag. [1] https://github.com/s9y/Serendipity/commit/1f037b462761cd592b90541ce4dfda2518 ad4711 -- Med venlig hilsen / Kind Regards, Jon Butler Junior Security Specialist Secunia Mikado House Rued Langgaardsvej 8 2300 Copenhagen S Denmark Phone +45 3338 5726 Please visit our corporate website: www.secunia.com Follow us on Twitter: http://twitter.com/secunia
Sorry I misunderstood. Thank you for clearing this out. Developer of this software did not comment anything when I asked if this is correct or not, but they indeed told me about a change to different version controlling software. - Henri Salo
Current thread:
- CVE-request: Serendipity 'serendipity[filter][bp.ALT]' Cross-Site Scripting vulnerability Henri Salo (Dec 01)
- Re: CVE-request: Serendipity 'serendipity[filter][bp.ALT]' Cross-Site Scripting vulnerability Henri Salo (Dec 01)
- Re: CVE-request: Serendipity 'serendipity[filter][bp.ALT]' Cross-Site Scripting vulnerability Kurt Seifried (Dec 01)
- <Possible follow-ups>
- RE: CVE-request: Serendipity 'serendipity[filter][bp.ALT]' Cross-Site Scripting vulnerability Secunia Research (Dec 01)
- Re: CVE-request: Serendipity 'serendipity[filter][bp.ALT]' Cross-Site Scripting vulnerability Henri Salo (Dec 01)