Symphony 2.2.3 - '/symphony/publish/comments?filter' SQL Injection
Author: Mesut Timur
type: webapps
platform: php
port:
date_added: 2011-11-01
date_updated: 2015-03-05
verified: 1
codes: CVE-2011-4341;OSVDB-76884
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/50470/info
Symphony is prone to multiple SQL-injection vulnerabilities and multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Symphony versions prior to 2.2.4 are vulnerable.
http://example.com/symphony/publish/comments/?filter='+(SELECT+1+FROM+(SELECT+SLEEP(25))A)+'