FreeBSD : serendipity -- multiple XSS vulnerabilities (9c133aa0-12bd-11dd-bab7-0016179b2dd5)

This script is Copyright (C) 2008-2014 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Hanno Boeck reports :

The installer of serendipity 1.3 has various Cross Site Scripting
issues. This is considered low priority, as attack scenarios are very
unlikely.

Various path fields are not escaped properly, thus filling them with
JavaScript code will lead to XSS. MySQL error messages are not
escaped, thus the database host field can also be filled with
JavaScript.

In the referrer plugin of the blog application serendipity, the
referrer string is not escaped, thus leading to a permanent XSS.

See also :

http://int21.de/cve/CVE-2008-1385-s9y.html
http://int21.de/cve/CVE-2008-1386-s9y.html
http://blog.s9y.org/archives/193-Serendipity-1.3.1-released.html
http://www.nessus.org/u?9dd549b8

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 32068 (freebsd_pkg_9c133aa012bd11ddbab70016179b2dd5.nasl)

Bugtraq ID: 28885

CVE ID: CVE-2008-1385
CVE-2008-1386

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now