Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 10 Oct 2017 19:54:53 +0200
Subject: Re: Reflected XSS vulnerability in Shaarli v0.9.1

> A reflected XSS vulnerability in Shaarli v0.9.1 allows an
> unauthenticated attacker to inject JavaScript. If the victim is an
> administrator, an attacker can (for example) takeover the admin session
> or change global settings or add/delete links. It is also possible to
> execute JavaScript against unauthenticated users.
> Fix:

CVE-2017-15215 has been assigned.


GPG: 3DE9 9187 4BE9 EAE6 3CA8  DC20 BA7B 93F9 9037 AE7E

Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.