XSS and SQL Injection Vulnerabilities in GNew

Information

Advisory by Netsparker (now Invicti)
Name: XSS and SQL Injection Vulnerabilities in GNew
Software: GNew 2013.1 and possibly below.
Vendor Homepage: http://freecode.com/projects/gnew
Vulnerability Type: Cross-Site Scripting and SQL Injection
Severity: Critical
Researcher: Omar Kurt
Advisory Reference: NS-13-016

Description

Gnew is a simple content management system. It is fully customizable using a template system, and supports multiple languages. It features easy installation, a simple but complete administration section, multi-level categories, article management, news management with an advanced comments system, poll management, user management, a forum, search engine, RSS feed generation, BBCode and HTML support, emoticons, and more.

Details

GNew is affected by XSS and Blind SQL Injection vulnerabilities in version 2013.1.
Example PoC urls are as follows:

  • XSS
    http://example.com/news/send.php (POST – params: news_id)
  • Blind SQL Injection
    http://example.com/news/send.php (POST – params: news_id)
    news_id='+(SELECT 1 FROM (SELECT SLEEP(25))A)+'

You can read the full article about Cross-Site Scripting and SQL Injection vulnerabilities from here:

Solution

No patch was released.

Advisory Timeline

28/08/2013 – First Contact – No Response
16/09/2013 – Second Contact – No response
18/12/2013 – Vulnerability Released

Credits

It has been discovered on testing of Invicti Web Application Security Scanner.

About Invicti

Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.