CVE-2015-6943
Published: 15 September 2015
SQL injection vulnerability in the serendipity_checkCommentToken function in include/functions_comments.inc.php in Serendipity before 2.0.2, when "Use Tokens for Comment Moderation" is enabled, allows remote administrators to execute arbitrary SQL commands via the serendipity[id] parameter to serendipity_admin.php.
Priority
Status
Package | Release | Status |
---|---|---|
serendipity Launchpad, Ubuntu, Debian |
precise |
Ignored
(end of life)
|
trusty |
Does not exist
|
|
upstream |
Released
(2.0.2)
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
Patches: upstream: https://github.com/s9y/Serendipity/releases/tag/2.0.2 |
References
- http://blog.s9y.org/archives/265-Serendipity-2.0.2-Security-Fix-Release.html
- http://seclists.org/fulldisclosure/2015/Sep/10
- http://packetstormsecurity.com/files/133428/Serendipity-2.0.1-Blind-SQL-Injection.html
- http://blog.curesec.com/article/blog/Serendipity-201-Blind-SQL-Injection-52.html
- https://www.cve.org/CVERecord?id=CVE-2015-6943
- NVD
- Launchpad
- Debian