RETIRED: Serendipity SQL Injection and Cross Site Scripting Vulnerabilities
BID:53428
Info
RETIRED: Serendipity SQL Injection and Cross Site Scripting Vulnerabilities
| Bugtraq ID: | 53428 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | May 09 2012 12:00AM |
| Updated: | May 15 2012 10:40PM |
| Credit: | Stefan Schurtz |
| Vulnerable: |
S9Y Serendipity 1.6 |
| Not Vulnerable: |
S9Y Serendipity 1.6.1 |
Discussion
RETIRED: Serendipity SQL Injection and Cross Site Scripting Vulnerabilities
Serendipity is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability.
Exploiting these vulnerabilities could allow an attacker to execute arbitrary script code, steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Serendipity 1.6 is vulnerable; other versions may also be affected.
This BID is being retired as a duplicate of the issue discussed in BID 53418 (Serendipity SQL Injection and Cross Site Scripting Vulnerabilities).
Serendipity is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability.
Exploiting these vulnerabilities could allow an attacker to execute arbitrary script code, steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Serendipity 1.6 is vulnerable; other versions may also be affected.
This BID is being retired as a duplicate of the issue discussed in BID 53418 (Serendipity SQL Injection and Cross Site Scripting Vulnerabilities).
Exploit / POC
RETIRED: Serendipity SQL Injection and Cross Site Scripting Vulnerabilities
Attackers can use a browser to exploit the SQL-injection issue. The attacker must trick an unsuspecting victim into following a malicious URI to exploit the cross-site scripting issue.
The following example URIs are available:
http://www.example.com/serendipity/serendipity_admin_image_selector.php?serendipity[textarea]='";</script><script>alert(document.cookie)</script>
http://www.example.com/serendipity/serendipity_admin.php?serendipity[adminModule]=plugins&serendipity[plugin_to_conf]=-1&apos; OR
SLEEP(10)=0 LIMIT 1--+
Attackers can use a browser to exploit the SQL-injection issue. The attacker must trick an unsuspecting victim into following a malicious URI to exploit the cross-site scripting issue.
The following example URIs are available:
http://www.example.com/serendipity/serendipity_admin_image_selector.php?serendipity[textarea]='";</script><script>alert(document.cookie)</script>
http://www.example.com/serendipity/serendipity_admin.php?serendipity[adminModule]=plugins&serendipity[plugin_to_conf]=-1&apos; OR
SLEEP(10)=0 LIMIT 1--+
Solution / Fix
RETIRED: Serendipity SQL Injection and Cross Site Scripting Vulnerabilities
Solution:
Updates are available. Please see the references for details.
Solution:
Updates are available. Please see the references for details.