CVE-2015-8603

Published Jan 12, 2016

Last updated 6 years ago

Overview

Description
Cross-site scripting (XSS) vulnerability in Serendipity before 2.0.3 allows remote attackers to inject arbitrary web script or HTML via the serendipity[entry_id] parameter in an "edit" admin action to serendipity_admin.php.
Source
cve@mitre.org
NVD status
Modified

Risk scores

CVSS 3.0

Type
Primary
Base score
5.4
Impact score
2.7
Exploitability score
2.3
Vector string
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Severity
MEDIUM

CVSS 2.0

Type
Primary
Base score
3.5
Impact score
2.9
Exploitability score
6.8
Vector string
AV:N/AC:M/Au:S/C:N/I:P/A:N

Weaknesses

nvd@nist.gov
CWE-79

Social media

Hype score
Not currently trending

Evaluator

Comment
Per http://blog.s9y.org/archives/266-Serendipity-2.0.3-released.html: "The issue only affects logged-in authors, where HTML can be inserted into the comment editing form when they click specially crafted links.Due to the required authentication we consider the issue of medium impact, but suggest everyone to perform the update."
Impact
-
Solution
-

Configurations