XSS and SQL Injection Vulnerabilities in Bilboplanet


Advisory by Netsparker (now Invicti)
Name: XSS and SQL Injection Vulnerabilities in Bilboplanet
Software: Bilboplanet 2 and possibly below.
Vendor Homepage: http://www.bilboplanet.com/
Vulnerability Type: Cross-Site Scripting and SQL Injection
Severity: Critical
Researcher: Omar Kurt
Advisory Reference: NS-13-012


The Bilboplanet project was founded in 2007 with a simple goal: to create a friendly, fully-functional planet CMS to allow everyone to create his own web community. Today, Bilboplanet is one of the most popular PHP planet CMS. With the help of numerous volunteer contributors around the world, Bilboplanet’s underlying open-source codebase has matured into a stable and feature-rich web platform.


Bilboplanet is affected by XSS and SQL Injection vulnerabilities in version 2.
Example PoC urls are as follows:

  • SQL Injection Vulnerabilities
    (POST – user_id)
    user_id=-1' or 1=1+(SELECT 1 and ROW(1,1)>(SELECT COUNT(*),CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97),0x3a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.COLLATIONS GROUP BY x)a)+'
  • XSS Vulnerabilities
    http://example.com/signup.php (POST –  params: email, fullname, user_id)
    http://example.com/auth.php (POST –  params: came_from, user_id)

Learn more about Cross-Site Scripting and SQL Injection vulnerabilities:


No patch released.

Advisory Timeline

05/09/2013 – Couldn’t found a contact e-mail
05/09/2013 – Send Message over Contact Form – No response
11/10/2013 – Vulnerability Released


It has been discovered on testing of Invicti Web Application Security Scanner.

About Invicti

Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.