First published: Tue Sep 15 2015(Updated: )
SQL injection vulnerability in the serendipity_checkCommentToken function in include/functions_comments.inc.php in Serendipity before 2.0.2, when "Use Tokens for Comment Moderation" is enabled, allows remote administrators to execute arbitrary SQL commands via the serendipity[id] parameter to serendipity_admin.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Serendipity (S9Y) Freetag Event | <=2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6943 is classified as a high-severity SQL injection vulnerability.
To mitigate CVE-2015-6943, upgrade to Serendipity version 2.0.2 or later.
CVE-2015-6943 affects Serendipity versions prior to 2.0.2 when 'Use Tokens for Comment Moderation' is enabled.
CVE-2015-6943 is an SQL injection vulnerability.
CVE-2015-6943 can potentially be exploited by remote administrators who can send crafted requests.