Vulnerability Details : CVE-2012-2332
SQL injection vulnerability in serendipity/serendipity_admin.php in Serendipity before 1.6.1 allows remote attackers to execute arbitrary SQL commands via the serendipity[plugin_to_conf] parameter. NOTE: this issue might be resultant from cross-site request forgery (CSRF).
Vulnerability category: Sql InjectionCross-site request forgery (CSRF)
Exploit prediction scoring system (EPSS) score for CVE-2012-2332
Probability of exploitation activity in the next 30 days: 3.31%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 91 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-2332
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2012-2332
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-2332
- http://archives.neohapsis.com/archives/bugtraq/2012-05/0037.html
-
http://www.openwall.com/lists/oss-security/2012/05/09/2
oss-security - Re: CVE request: XSS and SQL injection in serendipity before 1.7.1
-
http://www.securityfocus.com/bid/53418
Serendipity SQL Injection and Cross Site Scripting VulnerabilitiesExploit
-
http://www.koramis.com/advisories/2012/KORAMIS-ADV2012-001.txt
Seite wurde nicht gefunden. - KORAMIS GmbHExploit
-
http://www.rul3z.de/index.php?/214-KORAMISADV2012-001-Serendipity-1.6-Backend-Cross-Site-Scripting-and-SQL-Injection-vulnerability.html
404 Error - Page Not FoundExploit
-
http://www.openwall.com/lists/oss-security/2012/05/08/6
oss-security - CVE request: XSS and SQL injection in serendipity before 1.7.1
-
http://blog.s9y.org/archives/240-Serendipity-1.6.1-released.html
Serendipity 1.6.1 released - Serendipity
Products affected by CVE-2012-2332
- cpe:2.3:a:s9y:serendipity:*:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.7:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.8:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.6.1:*:*:*:*:*:*:*