glFusion 1.3.0 SQL Injection Vulnerability

Ens4R

Prof Spys-z
Katılım
9 Eki 2012
Mesajlar
1,642
Tepkime puanı
3
Puanları
0
Web sitesi
ajanlar.org
Information
--------------------
Name : SQL Injection Vulnerability in glFusion
Software : glFusion 1.3.0 and possibly below.
Vendor Homepage : http://www.glfusion.org
Vulnerability Type : Blind SQL Injection
Severity : Critical
Researcher : Omar Kurt
Advisory Reference : NS-13-009

Description
--------------------
A dynamic system based on flexible and granular permissions, with spam
protection, forums, file management, media gallery, calendars, polls,
site-wide search, RSS feeds, and more!

Details
--------------------
glFusion is affected by SQL Injection vulnerability in version 1.3.0.
Example PoC url is as follows:
Blind SQL Injection Vulnerability
http://example.com/mediagallery/search.php
POST - param:
cat_id='+(SELECT 1 FROM (SELECT SLEEP(25))A)+'

You can read the full article about SQL Injection vulnerabilities from here
:

http://www.mavitunasecurity.com/sql-injection/

Solution
--------------------
http://www.glfusion.org/article.php/glfusion131

Advisory Timeline
--------------------
05/09/2013 - First contact: No response
05/09/2013 - Vendor replied
05/09/2013 - Shared details
06/09/2013 - Fix released
09/09/2013 - Advisory Released

Credits
--------------------
It has been discovered on testing of Netsparker, Web Application Security
Scanner - http://www.mavitunasecurity.com/netsparker/.

References
--------------------
MSL Advisory Link :
https://www.mavitunasecurity.com/sql-injection-vulnerability-in-glfusion/
Netsparker Advisories :
http://www.mavitunasecurity.com/netsparker-advisories/

# 39806E53F1769F5D 1337day.com [2013-09-11] 18EA78711AAC8A28 #
 

mersin escort mersin e ticaret bodrum escort fethiye escort alanya escort konya escort konya escort bodrum escort vozol sakarya escort sakarya escort sakarya escort sakarya escort sakarya escort sakarya escort sakarya escort
Üst
Copyright® Ajanlar.org 2012