Name : XSS and SQL Injection Vulnerabilities in GNew
Software : GNew 2013.1 and possibly below.
Vendor Homepage :
Vulnerability Type : Cross-Site Scripting and SQL Injcetion
Severity : Critical
Researcher : Omar Kurt
Advisory Reference : NS-13-016

Gnew is a simple content management system. It is fully customizable using a template system, and supports multiple languages. It features easy installation, a simple but complete administration section, multi-level categories, article management, news management with an advanced comments system, poll management, user management, a forum, search engine, RSS feed generation, BBCode and HTML support, emoticons, and more.

GNew is affected by XSS and Blind SQL Injection vulnerabilities in version 2013.1.

Example PoC urls are as follows :

  • XSS (POST - params: news_id)
  • Blind SQL Injection (POST - params: news_id)
    news_id='+(SELECT 1 FROM (SELECT SLEEP(25))A)+'

You can read the full article about Cross-Site Scripting and SQL Injection vulnerabilities from here:

No patch released.

Advisory Timeline
28/08/2013 - First Contact - No Response
16/09/2013 - Second Contact - No response
18/12/2013 - Vulnerability Released

It has been discovered on testing of Netsparker Web Application Security Scanner.

About Netsparker
Netsparker® can find and report security issues such as SQL Injection and Cross-site Scripting (XSS) in all web applications regardless of the platform and the technology they are built on. Netsparker's unique detection and exploitation techniques allows it to be dead accurate in reporting hence it's the first and the only False Positive Free web application security scanner.