| VID |
21552 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Serendipity is vulnerable to an SQL injection vulnerability in the exit.php script. Serendipity is a Weblog/blog system written in PHP. Serendipity version 0.8beta4 could allow a remote attacker to execute arbitrary SQL commands via the 'url_id' and 'entry_id' parameters to the 'exit.php' script. This vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* References: http://archives.neohapsis.com/archives/bugtraq/2005-04/0194.html
* Platforms Affected: s9y, Serendipity versions prior to 0.8beta6 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Serendipity (0.8beta6 or later), available from the Serendipity Web site at http://www.s9y.org/5.html |
| Related URL |
CVE-2005-1134 (CVE) |
| Related URL |
13161 (SecurityFocus) |
| Related URL |
20119 (ISS) |
|