SQL injection vulnerability in the serendipity_checkCommentToken function in include/functions_comments.inc.php in Serendipity before 2.0.2, when "Use Tokens for Comment Moderation" is enabled, allows remote administrators to execute arbitrary SQL commands via the serendipity[id] parameter to serendipity_admin.php.
References
Configurations
History
21 Nov 2024, 02:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.curesec.com/article/blog/Serendipity-201-Blind-SQL-Injection-52.html - Exploit | |
References | () http://blog.s9y.org/archives/265-Serendipity-2.0.2-Security-Fix-Release.html - Patch | |
References | () http://packetstormsecurity.com/files/133428/Serendipity-2.0.1-Blind-SQL-Injection.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2015/Sep/10 - Exploit | |
References | () http://www.securitytracker.com/id/1033558 - |
Information
Published : 2015-09-15 18:59
Updated : 2024-11-21 02:35
NVD link : CVE-2015-6943
Mitre link : CVE-2015-6943
CVE.ORG link : CVE-2015-6943
JSON object : View
Products Affected
s9y
- serendipity
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')