Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 1 Dec 2011 14:13:16 +0100
From: "Secunia Research" <>
To: <>
Cc: <>,
Subject: RE: CVE-request: Serendipity 'serendipity[filter][bp.ALT]' Cross-Site Scripting vulnerability


The GIT commit referenced by the Secunia advisory [1] is the correct fix for
this issue.

The fix removed a line in the code that displayed an unsanitised variable in
one of the template files. This variable was inside a JavaScript comment
block, but this does not prevent exploitation when the payload is prefixed
with a </script> tag.



Med venlig hilsen / Kind Regards,
Jon Butler
Junior Security Specialist
Mikado House
Rued Langgaardsvej 8
2300 Copenhagen S

Phone +45 3338 5726

Please visit our corporate website:
Follow us on Twitter:

-----Original Message-----
From: Henri Salo [] 
Sent: 1. december 2011 10:59
Subject: [oss-security] CVE-request: Serendipity
'serendipity[filter][bp.ALT]' Cross-Site Scripting vulnerability

Original post:
Advisory URL:
New version announcement:

I contacted Garvin Hicking and he said this is indeed fixed in 1.6 code, but
they changed from SVN to Git so can't really refer to proper commit. Secunia
is linking in to
ad4711, which has nothing to do with the actual issue. Shame on Secunia.

This is one of logs, which can act like proof:

Please notify me if this is not enough information.

- Henri Salo

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.