Looking for the vulnerability index of Invicti's legacy products?
SQL Injection in Symphony - Vulnerability Database

SQL Injection in Symphony

Description

Symphony CMS versions prior to 2.3.2 contain an SQL injection vulnerability in the system/authors/ endpoint. Authenticated users can inject malicious SQL commands through the unsanitized sort parameter. This vulnerability can be exploited by unauthenticated attackers when combined with Cross-Site Request Forgery (CSRF), allowing them to execute arbitrary SQL commands against the application database without requiring valid credentials.

Remediation

Immediately upgrade Symphony CMS to version 2.3.2 or later, which addresses this SQL injection vulnerability. Follow these steps to remediate:

1. Backup your data: Create a complete backup of your Symphony CMS installation and database before proceeding
2. Update Symphony CMS: Download version 2.3.2 or the latest stable release from the official Symphony website
3. Apply the update: Follow the Symphony upgrade documentation to apply the update to your installation
4. Verify the fix: Confirm the version number in your admin panel shows 2.3.2 or higher
5. Review access logs: Examine application and database logs for any suspicious activity or unauthorized access attempts prior to patching

If immediate upgrading is not possible, implement temporary mitigations including restricting access to the system/authors/ endpoint through web application firewall rules and implementing CSRF token validation for all administrative functions.

Related Vulnerabilities