CVE-2015-6943
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
15/09/2015
Last modified:
12/04/2025
Description
SQL injection vulnerability in the serendipity_checkCommentToken function in include/functions_comments.inc.php in Serendipity before 2.0.2, when "Use Tokens for Comment Moderation" is enabled, allows remote administrators to execute arbitrary SQL commands via the serendipity[id] parameter to serendipity_admin.php.
Impact
Base Score 2.0
6.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:s9y:serendipity:*:*:*:*:*:*:*:* | 2.0.1 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://blog.curesec.com/article/blog/Serendipity-201-Blind-SQL-Injection-52.html
- http://blog.s9y.org/archives/265-Serendipity-2.0.2-Security-Fix-Release.html
- http://packetstormsecurity.com/files/133428/Serendipity-2.0.1-Blind-SQL-Injection.html
- http://seclists.org/fulldisclosure/2015/Sep/10
- http://www.securitytracker.com/id/1033558
- http://blog.curesec.com/article/blog/Serendipity-201-Blind-SQL-Injection-52.html
- http://blog.s9y.org/archives/265-Serendipity-2.0.2-Security-Fix-Release.html
- http://packetstormsecurity.com/files/133428/Serendipity-2.0.1-Blind-SQL-Injection.html
- http://seclists.org/fulldisclosure/2015/Sep/10
- http://www.securitytracker.com/id/1033558



