Description
|
|
Stefan Schurtz has discovered multiple vulnerabilities in Serendipity, which can be exploited by malicious people to conduct cross-site scripting attacks.
Input passed to the "serendipity[filter][entryid]", "serendipity[filter][ip]", "serendipity[filter][title]", and "serendipity[filter][user_agent]" parameters in serendipity_admin.php (when "serendipity[adminModule]" is set to "event_display" and "serendipity[adminAction]" is set to "karmalog") is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Successful exploitation requires that the "Karma" plugin is enabled.
The vulnerabilities are confirmed in version 1.6. Other versions may also be affected.
|