SQL injection vulnerability in exit.php for Serendipity 0.8 and earlier allows remote attackers to execute arbitrary SQL commands via the (1) url_id or (2) entry_id parameters.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Serendipity | S9y | 0.3 (including) | 0.3 (including) |
Serendipity | S9y | 0.4 (including) | 0.4 (including) |
Serendipity | S9y | 0.5 (including) | 0.5 (including) |
Serendipity | S9y | 0.5_pl1 (including) | 0.5_pl1 (including) |
Serendipity | S9y | 0.6 (including) | 0.6 (including) |
Serendipity | S9y | 0.6_pl1 (including) | 0.6_pl1 (including) |
Serendipity | S9y | 0.6_pl2 (including) | 0.6_pl2 (including) |
Serendipity | S9y | 0.6_pl3 (including) | 0.6_pl3 (including) |
Serendipity | S9y | 0.6_rc1 (including) | 0.6_rc1 (including) |
Serendipity | S9y | 0.6_rc2 (including) | 0.6_rc2 (including) |
Serendipity | S9y | 0.7 (including) | 0.7 (including) |
Serendipity | S9y | 0.7_beta1 (including) | 0.7_beta1 (including) |
Serendipity | S9y | 0.7_beta2 (including) | 0.7_beta2 (including) |
Serendipity | S9y | 0.7_beta3 (including) | 0.7_beta3 (including) |
Serendipity | S9y | 0.7_beta4 (including) | 0.7_beta4 (including) |
Serendipity | S9y | 0.7_rc1 (including) | 0.7_rc1 (including) |
Serendipity | S9y | 0.8_beta5 (including) | 0.8_beta5 (including) |
Serendipity | S9y | 0.8_beta6 (including) | 0.8_beta6 (including) |