漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Serendipity: Host Header Injection enables authentication cookie scoping to an attacker-controlled domain
Vulnerability Description
Serendipity is a PHP-powered weblog engine. In versions 2.6-beta2 and below, the serendipity_setCookie() function in include/functions_config.inc.php uses $_SERVER['HTTP_HOST'] without validation as the domain parameter of setcookie(). An attacker who can influence the Host header at login time, such as via MITM, reverse proxy misconfiguration, or load balancer manipulation, can force authentication cookies including session tokens and auto-login tokens to be scoped to an attacker-controlled domain. This enables session fixation, token leakage to attacker-controlled infrastructure, and privilege escalation if an admin logs in under a poisoned Host header. This issue has been fixed in version 2.6.0.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N
Vulnerability Type
在信任Cookie未进行验证与完整性检查
Vulnerability Title
Serendipity 安全漏洞
Vulnerability Description
Serendipity是Serendipity团队的一套基于PHP的博客系统。该系统支持创建在线日记、博客、网页等。 Serendipity 2.6-beta2及之前版本存在安全漏洞,该漏洞源于serendipity_setCookie函数未验证HTTP_HOST标头,可能导致会话固定、令牌泄露或权限提升。
CVSS Information
N/A
Vulnerability Type
N/A