Symphony CMS ‘filter’参数SQL注入漏洞

漏洞信息详情

Symphony CMS ‘filter’参数SQL注入漏洞

漏洞简介

Symphony CMS是一套采用PHP和MySQL开发的内容管理系统(CMS)。该系统支持搜索引擎优化、模块扩展等。

Symphony CMS的symphony/content/content.publish.php中存在多个SQL注入漏洞。拥有作者权限的远程认证用户可利用漏洞借助(1) symphony/publish/comments或(2) symphony/publish/images的filter参数,执行任意SQL命令。Symphony CMS 2.2.3版本中存在这些漏洞,2.2.4之前版本也可能存在。

漏洞公告

目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:

http://symphony-cms.com/download/

参考网址

来源: github.com

链接:https://github.com/symphonycms/symphony-2/commit/476e4926e2773588eab10dd3036f27e1411521b5

来源: XF

名称: symphony-filter-sql-injection(71105)

链接:http://xforce.iss.net/xforce/xfdb/71105

来源: OSVDB

名称: 76884

链接:http://www.osvdb.org/76884

来源: MLIST

名称: [oss-security] 20111122 Re: CVE-request: Symphony CMS Multiple Cross-Site Scripting and SQL Injection Vulnerabilities (NS-11-008)

链接:http://www.openwall.com/lists/oss-security/2011/11/22/9

来源: www.mavitunasecurity.com

链接:http://www.mavitunasecurity.com/xss-and-sql-injection-vulnerabilities-in-symphony-cms/

来源: symphony-cms.com

链接:http://symphony-cms.com/download/releases/version/2.2.4/

来源: SECUNIA

名称: 46663

链接:http://secunia.com/advisories/46663

来源: BUGTRAQ

名称: 20111101 XSS and SQL Injection Vulnerabilities on Symphony CMS 2.2.3

链接:http://seclists.org/bugtraq/2011/Nov/8

来源: packetstormsecurity.org

链接:http://packetstormsecurity.org/files/view/106493/symphonycms-sqlxss.txt

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享