Package: serendipity
Version: 1.3.1-1
Severity: important
Tags: security

http://blog.s9y.org/archives/240-Serendipity-1.6.1-released.html

"This release mainly addresses two security issues found by Stefan
Schurtz (thanks a lot, again!). One is a XSS issue in the media
database panel, the other an SQL injection in the media database
section. Both issues can only be exploited if you are logged in to your
blog and you click a specially crafted link. The SQL injection cannot
be used to extract sensitive information from the database or delete
data."

CVE-identifier requested in mailing list post: 
http://seclists.org/oss-sec/2012/q2/276

-- System Information:
Debian Release: 6.0.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF-8)
Shell: /bin/sh linked to /bin/dash



-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to