Symphony cms 2.3 multiple vulnerabilities
Symphony-cms version 2.3 is vulnerable to several vulnerabilities ranging in severity from low to high and can result in complete compromise by an unauthenticated attacker. Direct requests to library files will disclose the full local file path if php is configured to display errors due to the reliance on the library path being declared in a constant of global scope outside of the library script. The retrive password url http://host/path/symphony/login/retrieve-password/ will display a helpful error message if the email address entered does not exist in the database. Symphony-cms allows a user to login without entering their username and password via a remote auth url that contains a token made up of the first 8 characters of a sha1 hash of the user's username and hashed password. The email input field suplied in the retrieve password form is vulnerable to reflected cross site scripting. The “about” field in the user profile is vulnerable to stored cross site scripting. The “sort” parameter supplied in the “authors” page is vulnerable to SQL injection.