|
Message-ID: <1449401253.941441283282955256.JavaMail.root@zmail01.collab.prod.int.phx2.redhat.com> Date: Tue, 31 Aug 2010 15:29:15 -0400 (EDT) From: Josh Bressers <bressers@...hat.com> To: oss-security@...ts.openwall.com Cc: coley <coley@...re.org> Subject: Re: CVE request: serendipity < 1.5.4 xss Please use CVE-2010-2957 Thanks. -- JB ----- "Hanno Böck" <hanno@...eck.de> wrote: > http://blog.s9y.org/archives/223-Serendipity-1.5.4-released.html > > http://www.htbridge.ch/advisory/xss_vulnerability_in_serendipity.html > > "as well as a XSS security issue discovered and reported by High-Tech > Bridge. > The XSS is only exploitable though, if you are using the "Remember me" > feature > in the Serendipity backend to login." > > > > -- > Hanno Böck Blog: http://www.hboeck.de/ > GPG: 3DBD3B20 Jabber/Mail: hanno@...eck.de > > http://schokokeks.org - professional webhosting
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.