Korean
<< Back
VID 21382
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Serendipity is vulnerable to a SQL Injection Vulnerability.
Serendipity is a Weblog/blog system used with PHP. Serendipity 0.7-beta1 and prior are vulnerable to a SQL Injection Vulnerability in the 'exit.php' and 'comment.php', caused by improper validating user-supplied input in the 'entry_id' parameter. By sending a specially crafted parameter value to inject SQL commands, a remote attacker could cause the embedded SQL command to be executed on the target system, including to add, modify or delete data in the backend database,

* References:
http://packetstormsecurity.org/0410-exploits/serendipityPoC.txt
http://www.osvdb.org/displayvuln.php?osvdb_id=10371
http://securitytracker.com/alerts/2004/Sep/1011448.html

* Platforms Affected:
s9y, Serendipity 0.7-beta1 and prior
Any operating system Any version
Recommendation Upgrade to the latest version of Serendipity (0.7-beta3 or later) fixed this issue, available from the SourceForge.net Web site at http://prdownloads.sourceforge.net/php-blog/serendipity-0.7-beta3.tar.gz?download
Related URL CVE-2004-2158 (CVE)
Related URL 11269 (SecurityFocus)
Related URL 17533 (ISS)