XSS and SQL Injection Vulnerabilities in GNew


Advisory by Netsparker (now Invicti)
Name: XSS and SQL Injection Vulnerabilities in GNew
Software: GNew 2013.1 and possibly below.
Vendor Homepage: http://freecode.com/projects/gnew
Vulnerability Type: Cross-Site Scripting and SQL Injection
Severity: Critical
Researcher: Omar Kurt
Advisory Reference: NS-13-016


Gnew is a simple content management system. It is fully customizable using a template system, and supports multiple languages. It features easy installation, a simple but complete administration section, multi-level categories, article management, news management with an advanced comments system, poll management, user management, a forum, search engine, RSS feed generation, BBCode and HTML support, emoticons, and more.


GNew is affected by XSS and Blind SQL Injection vulnerabilities in version 2013.1.
Example PoC urls are as follows:

  • XSS
    http://example.com/news/send.php (POST – params: news_id)
  • Blind SQL Injection
    http://example.com/news/send.php (POST – params: news_id)
    news_id='+(SELECT 1 FROM (SELECT SLEEP(25))A)+'

You can read the full article about Cross-Site Scripting and SQL Injection vulnerabilities from here:


No patch was released.

Advisory Timeline

28/08/2013 – First Contact – No Response
16/09/2013 – Second Contact – No response
18/12/2013 – Vulnerability Released


It has been discovered on testing of Invicti Web Application Security Scanner.

About Invicti

Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.