DSA-1528-1 serendipity -- insufficient input sanitising

Related Vulnerabilities: CVE-2007-6205   CVE-2008-0124   CVE-2008-1476  

Peter Hüwe and Hanno Böck discovered that Serendipity, a weblog manager, did not properly sanitise input to several scripts which allowed cross site scripting. The old stable distribution (sarge) does not contain a serendipity package. For the stable distribution (etch), this problem has been fixed in version 1.0.4-1+etch1. For the unstable distribution (sid), this problem has been fixed in version 1.3-1. We recommend that you upgrade your serendipity package.

Debian Security Advisory

DSA-1528-1 serendipity -- insufficient input sanitising

Date Reported:
24 Mar 2008
Affected Packages:
serendipity
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 469667.
In Mitre's CVE dictionary: CVE-2007-6205, CVE-2008-0124, CVE-2008-1476.
More information:

Peter Hüwe and Hanno Böck discovered that Serendipity, a weblog manager, did not properly sanitise input to several scripts which allowed cross site scripting.

The old stable distribution (sarge) does not contain a serendipity package.

For the stable distribution (etch), this problem has been fixed in version 1.0.4-1+etch4.

For the unstable distribution (sid), this problem has been fixed in version 1.3-1.

We recommend that you upgrade your serendipity package.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/s/serendipity/serendipity_1.0.4.orig.tar.gz
http://security.debian.org/pool/updates/main/s/serendipity/serendipity_1.0.4-1+etch4.diff.gz
http://security.debian.org/pool/updates/main/s/serendipity/serendipity_1.0.4-1+etch4.dsc
Architecture-independent component:
http://security.debian.org/pool/updates/main/s/serendipity/serendipity_1.0.4-1+etch4_all.deb

MD5 checksums of the listed files are available in the original advisory.