[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97389

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2012-2332

Date: (C)2012-08-13   (M)2015-12-16
 
CVSS Score: 7.5Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











SQL injection vulnerability in serendipity/serendipity_admin.php in Serendipity before 1.6.1 allows remote attackers to execute arbitrary SQL commands via the serendipity[plugin_to_conf] parameter. NOTE: this issue might be resultant from cross-site request forgery (CSRF).

Reference:
http://archives.neohapsis.com/archives/bugtraq/2012-05/0037.html
BID-53418
http://www.openwall.com/lists/oss-security/2012/05/08/6
http://www.openwall.com/lists/oss-security/2012/05/09/2
http://blog.s9y.org/archives/240-Serendipity-1.6.1-released.html
http://www.koramis.com/advisories/2012/KORAMIS-ADV2012-001.txt
http://www.rul3z.de/index.php?/214-KORAMISADV2012-001-Serendipity-1.6-Backend-Cross-Site-Scripting-and-SQL-Injection-vulnerability.html

CPE    35
cpe:/a:s9y:serendipity:1.1.4
cpe:/a:s9y:serendipity:1.4.1
cpe:/a:s9y:serendipity:1.0.4
cpe:/a:s9y:serendipity:1.1.3
...
CWE    1
CWE-89

© 2013 SecPod Technologies