Symphony Password Retrieval Script XSS

This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.


Synopsis :

The remote host is running a web application affected by a cross-site
scripting vulnerability.

Description :

The remote host is running a version of Symphony that is affected
by a cross-site scripting vulnerability. The 'email' parameter of the
'/symphony/login/retrieve-password/' script is not properly sanitized,
and may allow an attacker to execute arbitrary script code in the
browser of an unsuspecting user.

This version of Symphony may also be affected by other XSS and SQL
injection vulnerabilities although Nessus has not tested for these
additional issues.

See also :

http://www.justanotherhacker.com/advisories/JAHx122.txt
http://github.com/symphonycms/symphony-2
http://getsymphony.com/download/releases/version/2.3.1/

Solution :

Upgrade to Symphony 2.3.1 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.4
(CVSS2#E:POC/RL:OF/RC:ND)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 62813 ()

Bugtraq ID: 56094

CVE ID:

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial