Name : SQL Injection Vulnerability in glFusion
Software : glFusion 1.3.0 and possibly below.
Vendor Homepage :
Vulnerability Type : Blind SQL Injection
Severity : Critical
Researcher : Omar Kurt
Advisory Reference : NS-13-009


A dynamic system based on flexible and granular permissions, with spam protection, forums, file management, media gallery, calendars, polls, site-wide search, RSS feeds, and more!


glFusion is affected by SQL Injection vulnerability in version 1.3.0. Example PoC url is as follows:

Blind SQL Injection Vulnerability

    POST - param:
    cat_id='+(SELECT 1 FROM (SELECT SLEEP(25))A)+'

You can read the full article about SQL Injection vulnerabilities from here :


Advisory Timeline

05/09/2013 - First contact: No response
05/09/2013 - Vendor replied
05/09/2013 - Shared details
06/09/2013 - Fix released
09/09/2013 - Advisory Released


It has been discovered on testing of Netsparker Web Application Security Scanner.

MSL Advisory Link : /sql-injection-vulnerability-in-glfusion/
Netsparker Advisories : /web-applications-advisories/

About Netsparker

Netsparker® can find and report security issues such as SQL Injection and Cross-site Scripting (XSS) in all web applications regardless of the platform and the technology they are built on. Netsparker's unique detection and exploitation techniques allows it to be dead accurate in reporting hence it's the first and the only False Positive Free web application security scanner.