Symphony Password Retrieval Script XSS

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

The remote host is running a web application affected by a cross-site
scripting vulnerability.

Description :

The remote host is running a version of Symphony that is affected
by a cross-site scripting vulnerability. The 'email' parameter of the
'/symphony/login/retrieve-password/' script is not properly sanitized,
and may allow an attacker to execute arbitrary script code in the
browser of an unsuspecting user.

This version of Symphony may also be affected by other XSS and SQL
injection vulnerabilities although Nessus has not tested for these
additional issues.

See also :

http://www.justanotherhacker.com/advisories/JAHx122.txt
http://github.com/symphonycms/symphony-2
http://getsymphony.com/download/releases/version/2.3.1/

Solution :

Upgrade to Symphony 2.3.1 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 62813 ()

Bugtraq ID: 56094

CVE ID: