header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SQL Injection vulnerability in Serendipity

Serendipity is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Serendipity Weblog SQL Injection

The Proof of Concept (PoC) demonstrates two SQL injection vulnerabilities in the Serendipity Weblog application. The first PoC script retrieves the username and MD5 hashed password of the first author from the 'serendipity_authors' table. The second PoC is a URL that can be used in the browser to retrieve the username and password of the first author from the 'serendipity_authors' table.

Serendipity 2.4.0 – Remote Code Execution (RCE) (Authenticated)

If we load the poc.phar file in the image field while creating a category, we can run commands on the system. The exploit uses the payload '<?php echo system("cat /etc/passwd"); ?>' to execute the 'cat /etc/passwd' command on the system. The file with the payload is uploaded with a .phar extension.

Serendipity Freetag-plugin Cross-Site Scripting Vulnerability

Serendipity Freetag-plugin is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. Exploiting this issue could allow an attacker to steal cookie-based authentication credentials and to launch other attacks.

Serendipity Cross-Site Scripting Vulnerability

Serendipity is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Recent Exploits: