#VU44013 SQL injection in Serendipity - CVE-2012-2762
Published: June 7, 2012 / Updated: August 11, 2020
Serendipity
s9y.org
Description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via the url parameter to comment.php. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Remediation
External links
- http://blog.s9y.org/archives/241-Serendipity-1.6.2-released.html
- http://secunia.com/advisories/49234
- http://www.osvdb.org/82036
- http://www.securityfocus.com/bid/53620
- http://www.securitytracker.com/id?1027079
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75760
- https://github.com/s9y/Serendipity/commit/87153991d06bc18fe4af05f97810487c4a340a92#diff-1
- https://www.htbridge.com/advisory/HTB23092