Description
SQL injection vulnerability in serendipity/serendipity_admin.php in Serendipity before 1.6.1 allows remote attackers to execute arbitrary SQL commands via the serendipity[plugin_to_conf] parameter. NOTE: this issue might be resultant from cross-site request forgery (CSRF).
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Stefan Schurtz · textwebappsphp
https://www.exploit-db.com/exploits/18884
References (7)
Core 7
Core References
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2012/05/08/6
Exploit x_refsource_misc
http://www.rul3z.de/index.php?/214-KORAMISADV2012-001-Serendipity-1.6-Backend-Cross-Site-Scripting-and-SQL-Injection-vulnerability.html
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/53418
Exploit x_refsource_misc
http://www.koramis.com/advisories/2012/KORAMIS-ADV2012-001.txt
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2012/05/09/2
Various Sources x_refsource_confirm
http://blog.s9y.org/archives/240-Serendipity-1.6.1-released.html
Third Party Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2012-05/0037.html
Scores
EPSS
0.0144
EPSS Percentile
80.8%
Details
CWE
CWE-89
Status
published
Products (35)
s9y/serendipity
0.3
s9y/serendipity
0.4
s9y/serendipity
0.7
s9y/serendipity
0.7.1
s9y/serendipity
0.8
s9y/serendipity
0.8.1
s9y/serendipity
0.8.2
s9y/serendipity
0.8.3
s9y/serendipity
0.8.4
s9y/serendipity
0.8.5
... and 25 more
Published
Aug 13, 2012
Tracked Since
Feb 18, 2026