Summary
This host is running Serendipity and is prone to security bypass vulnerability.
Impact
Successful exploitation will allow attacker to bypass intended access restrictions and modify the configuration of arbitrary plugins.
Impact Level: Application
Solution
Upgrade to Serendipity version 1.5.3 or later.
For updates refer to http://www.s9y.org/12.html
Insight
The flaw is due to an input validation error in 'Xinha WYSIWYG' editor with dynamic configuration feature enabled when processing the, - crafted 'backend_config_secret_key_location' and 'backend_config_hash' parameters that are used in a SHA1 hash of a shared secret that can be known or externally influenced, which are not properly handled by the 'Deprecated config passing' feature.
- crafted 'backend_data' and 'backend_data[key_location]' variables, which are not properly handled by the 'xinha_read_passed_data()' function.
Affected
Serendipity version 1.5.2 and on all platforms.
References
Severity
Classification
-
CVE CVE-2010-1916 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities