Lucene search

K
htbridgeHigh-Tech BridgeHTB23148
HistoryMar 13, 2013 - 12:00 a.m.

SQL Injection Vulnerability in Symphony

2013-03-1300:00:00
High-Tech Bridge
www.htbridge.com
48

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

40.9%

High-Tech Bridge Security Research Lab discovered SQL injection vulnerability in Symphony, which can be exploited to alter SQL requests to database of the vulnerable application.

  1. SQL Injection in Symphony: CVE-2013-2559
    The vulnerability exists due to insufficient filtration of “sort” HTTP GET parameter passed via “/symphony/system/authors/” URL to “/index.php” script. A remote authenticated administrator can execute arbitrary SQL commands in the application’s database.
    Depending on database and system configuration, this PoC (Proof of Concept) code will create “/var/www/file.txt” file, containing users account information (logins, hashed passwords, etc.) from the “authors” table:
    http://[host]/symphony/system/authors/?order=asc&sort=id%20INTO%20OUTFILE%20 %27/var/www/file.txt%27%20–%20

This vulnerability could also be exploited by a remote non-authenticated attacker via CSRF vector, since the application is prone to Cross-Site Request Forgery (CSRF) attacks. In order to do so an attacker should trick the logged-in administrator to visit a web page with CSRF exploit:
<img src=“http://[host]/symphony/system/authors/?order=asc&sort=id%20INTO%20OUTFI LE%20%27/var/www/file.txt%27%20–%20”>

CPENameOperatorVersion
symphonyle2.3.1

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

40.9%