There is CSRF in Serendipity 2.0.5, allowing attackers to install any themes via a GET request.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2017/Apr/52 | patch mailing list third party advisory |
https://github.com/s9y/Serendipity/issues/452 | patch third party advisory issue tracking |