SQL Injection Vulnerability in glFusion
Advisory by Netsparker (now Invicti)
Name: SQL Injection Vulnerability in glFusion
Software: glFusion 1.3.0 and possibly below.
Vendor Homepage: http://www.glfusion.org
Vulnerability Type: Blind SQL Injection
Researcher: Omar Kurt
Advisory Reference: NS-13-009
A dynamic system based on flexible and granular permissions, with spam protection, forums, file management, media gallery, calendars, polls, site-wide search, RSS feeds, and more!
glFusion is affected by SQL Injection vulnerability in version 1.3.0. Example PoC url is as follows:
Blind SQL Injection Vulnerability
POST – param:
cat_id='+(SELECT 1 FROM (SELECT SLEEP(25))A)+'
You can read the full article about SQL Injection vulnerabilities from here:
05/09/2013 – First contact: No response
05/09/2013 – Vendor replied
05/09/2013 – Shared details
06/09/2013 – Fix released
09/09/2013 – Advisory Released
It has been discovered on testing of Invicti Web Application Security Scanner.
- MSL Advisory Link: /sql-injection-vulnerability-in-glfusion/
- Invicti Advisories: /web-applications-advisories/
Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.