Vulnerabilities > CVE-2004-2157 - Unspecified vulnerability in S9Y Serendipity 0.7Beta1
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN s9y
nessus
Summary
Cross-site scripting (XSS) vulnerability in Comment.php in Serendipity 0.7 beta1, and possibly other versions before 0.7-beta3, allows remote attackers to inject arbitrary HTML and PHP code via the (1) email or (2) username field.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | CGI abuses |
NASL id | SERENDIPITY_SQL.NASL |
description | The remote version of Serendipity is vulnerable to SQL injection issues due to a failure of the application to properly sanitize user- supplied input. An attacker may exploit this flaw to issue arbitrary statements in the remote database, and therefore, bypass authorization or even overwrite arbitrary files on the remote system In addition, the comment.php script is vulnerable to a cross-site scripting attack. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14842 |
published | 2004-09-28 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14842 |
title | Serendipity < 0.7.0beta3 Multiple Vulnerabilities |
code |
|
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026955.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026955.html
- http://secunia.com/advisories/12673/
- http://secunia.com/advisories/12673/
- http://securitytracker.com/id?1011448
- http://securitytracker.com/id?1011448
- http://www.securityfocus.com/bid/11269
- http://www.securityfocus.com/bid/11269
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17536
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17536