XSS and SQL Injection Vulnerabilities in GNew
Information
Advisory by Netsparker (now Invicti)
Name: XSS and SQL Injection Vulnerabilities in GNew
Software: GNew 2013.1 and possibly below.
Vendor Homepage: http://freecode.com/projects/gnew
Vulnerability Type: Cross-Site Scripting and SQL Injection
Severity: Critical
Researcher: Omar Kurt
Advisory Reference: NS-13-016
Description
Gnew is a simple content management system. It is fully customizable using a template system, and supports multiple languages. It features easy installation, a simple but complete administration section, multi-level categories, article management, news management with an advanced comments system, poll management, user management, a forum, search engine, RSS feed generation, BBCode and HTML support, emoticons, and more.
Details
GNew is affected by XSS and Blind SQL Injection vulnerabilities in version 2013.1.
Example PoC urls are as follows:
- XSS
http://example.com/news/send.php
(POST – params: news_id) - Blind SQL Injection
http://example.com/news/send.php
(POST – params: news_id)news_id='+(SELECT 1 FROM (SELECT SLEEP(25))A)+'
You can read the full article about Cross-Site Scripting and SQL Injection vulnerabilities from here:
Solution
No patch was released.
Advisory Timeline
28/08/2013 – First Contact – No Response
16/09/2013 – Second Contact – No response
18/12/2013 – Vulnerability Released
Credits
It has been discovered on testing of Invicti Web Application Security Scanner.
About Invicti
Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.