SQL Injection Vulnerability in glFusion
Information
Advisory by Netsparker (now Invicti)
Name: SQL Injection Vulnerability in glFusion
Software: glFusion 1.3.0 and possibly below.
Vendor Homepage: http://www.glfusion.org
Vulnerability Type: Blind SQL Injection
Severity: Critical
Researcher: Omar Kurt
Advisory Reference: NS-13-009
Description
A dynamic system based on flexible and granular permissions, with spam protection, forums, file management, media gallery, calendars, polls, site-wide search, RSS feeds, and more!
Details
glFusion is affected by SQL Injection vulnerability in version 1.3.0. Example PoC url is as follows:
Blind SQL Injection Vulnerability
http://example.com/mediagallery/search.php
POST – param:cat_id='+(SELECT 1 FROM (SELECT SLEEP(25))A)+'
You can read the full article about SQL Injection vulnerabilities from here:
Solution
http://www.glfusion.org/article.php/glfusion131
Advisory Timeline
05/09/2013 – First contact: No response
05/09/2013 – Vendor replied
05/09/2013 – Shared details
06/09/2013 – Fix released
09/09/2013 – Advisory Released
Credits
It has been discovered on testing of Invicti Web Application Security Scanner.
References
- MSL Advisory Link: /sql-injection-vulnerability-in-glfusion/
- Invicti Advisories: /web-applications-advisories/
About Invicti
Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.