VID |
210127 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
A version of Serendipity which is older than version 1.6.2 is detected as installed on the host. Serendipity is a Weblog/blog system written in PHP. The version of the Serendipity installed on the remote host is affected by a SQL injection vulnerability because the 'include/functions_trackbacks.inc.php' script does not properly sanitize user supplied input passed via the 'url' parameter to the 'comment.php' script. Provided that PHP's 'magic_quotes_gpc' setting is disabled, this may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.
* Note: This check solely relied on the version number of the Serendipity software installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: https://www.htbridge.com/advisory/HTB23092 http://blog.s9y.org/archives/241-Serendipity-1.6.2-released.html
* Platforms Affected: s9y, Serendipity versions prior to 1.6.2 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Serendipity (1.6.2 or later), available from the SourceForge.net Web site at http://sourceforge.net/projects/php-blog/ |
Related URL |
CVE-2012-2762 (CVE) |
Related URL |
53620 (SecurityFocus) |
Related URL |
20641,20642 (ISS) |
|