![]() |
|
Date: Sun, 29 Aug 2010 21:26:09 +0200
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Subject: CVE request: serendipity < 1.5.4 xss
http://blog.s9y.org/archives/223-Serendipity-1.5.4-released.html
http://www.htbridge.ch/advisory/xss_vulnerability_in_serendipity.html
"as well as a XSS security issue discovered and reported by High-Tech Bridge.
The XSS is only exploitable though, if you are using the "Remember me" feature
in the Serendipity backend to login."
--
Hanno Böck Blog: http://www.hboeck.de/
GPG: 3DBD3B20 Jabber/Mail: hanno@...eck.de
http://schokokeks.org - professional webhosting
Download attachment "signature.asc " of type "application/pgp-signature" (199 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.