Vulnerabilities > CVE-2004-2158 - Input Validation vulnerability in S9Y Serendipity 0.7Beta1
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
SQL injection vulnerability in Serendipity 0.7-beta1 allows remote attackers to execute arbitrary SQL commands via the entry_id parameter to (1) exit.php or (2) comment.php.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Serendipity 0.7-beta1 SQL Injection Proof of Concept. CVE-2004-2158. Webapps exploit for php platform |
id | EDB-ID:561 |
last seen | 2016-01-31 |
modified | 2004-09-28 |
published | 2004-09-28 |
reporter | aCiDBiTS |
source | https://www.exploit-db.com/download/561/ |
title | Serendipity 0.7-beta1 SQL Injection Proof of Concept |
Nessus
NASL family | CGI abuses |
NASL id | SERENDIPITY_SQL.NASL |
description | The remote version of Serendipity is vulnerable to SQL injection issues due to a failure of the application to properly sanitize user- supplied input. An attacker may exploit this flaw to issue arbitrary statements in the remote database, and therefore, bypass authorization or even overwrite arbitrary files on the remote system In addition, the comment.php script is vulnerable to a cross-site scripting attack. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14842 |
published | 2004-09-28 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14842 |
title | Serendipity < 0.7.0beta3 Multiple Vulnerabilities |
code |
|
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026955.html
- http://secunia.com/advisories/12673/
- http://securitytracker.com/id?1011448
- http://www.osvdb.org/10370
- http://www.osvdb.org/10371
- http://www.securityfocus.com/bid/11269
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17533