This is a writeup detailing multiple SQL injection vulnerabilities in Symphony CMS 2.6.3, specifically in the 'fields[username]', 'fields[email]', and 'action[save]' parameters. It includes payload examples for boolean-based blind, error-based, and time-based blind SQL injection techniques.
Classification
Writeup 90%
Attack Type
Sqli
Complexity
Moderate
Reliability
Reliable
Target:Symphony CMS 2.6.3
No auth needed
Prerequisites:Access to the vulnerable endpoint '/symphony/system/authors/new/'