Debian Security Advisory

DSA-1528-1 serendipity -- insufficient input sanitising

Date Reported:
24 Mar 2008
Affected Packages:
serendipity
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 469667.
In Mitre's CVE dictionary: CVE-2007-6205, CVE-2008-0124, CVE-2008-1476.
More information:

Peter Hüwe and Hanno Böck discovered that Serendipity, a weblog manager, did not properly sanitise input to several scripts which allowed cross site scripting.

The old stable distribution (sarge) does not contain a serendipity package.

For the stable distribution (etch), this problem has been fixed in version 1.0.4-1+etch1.

For the unstable distribution (sid), this problem has been fixed in version 1.3-1.

We recommend that you upgrade your serendipity package.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/s/serendipity/serendipity_1.0.4.orig.tar.gz
http://security.debian.org/pool/updates/main/s/serendipity/serendipity_1.0.4-1+etch1.diff.gz
http://security.debian.org/pool/updates/main/s/serendipity/serendipity_1.0.4-1+etch1.dsc
Architecture-independent component:
http://security.debian.org/pool/updates/main/s/serendipity/serendipity_1.0.4-1+etch1_all.deb

MD5 checksums of the listed files are available in the original advisory.