Name : XSS and SQL Injection Vulnerabilities in CourseMS
Software : CourseMS 2.2.1 and possibly below.
Vendor Homepage :
Vulnerability Type : Cross-Site Scripting and SQL Injection
Severity : Critical
Researcher : Omar Kurt
Advisory Reference : NS-13-013

This is a Course Management System for anybody running courses. Essentially allows for users to register online and also to provide your website with published course schedules and control over registrations, all managed by an administrator console.

CourseMS is affected by XSS and SQL Injection vulnerabilities in version 2.2.1.

Example PoC urls are as follows :

  • SQL Injection Vulnerabilities
    (POST - username)
    username='+(SELECT 1 FROM (SELECT SLEEP(25))A)+'
    (POST - email)
    email='+(SELECT 1 FROM (SELECT SLEEP(25))A)+'
    (POST - username)
    username='+(SELECT 1 FROM (SELECT SLEEP(25))A)+'
  • XSS Vulnerabilities (POST -  params: work_tel, lastname, email, gmc_reg, job_title, firstname) (POST -  params: username) (POST -  params: username)

You can read the full article about Cross-Site Scripting and SQL Injection vulnerabilities from here :

No patch released.

Advisory Timeline
05/09/2013 - Couldn't found a contact e-mail
05/09/2013 - Send Message over SourceForge - No response
21/10/2013 - Vulnerability Released

It has been discovered on testing of Netsparker Web Application Security Scanner.

About Netsparker
Netsparker® can find and report security issues such as SQL Injection and Cross-site Scripting (XSS) in all web applications regardless of the platform and the technology they are built on. Netsparker's unique detection and exploitation techniques allows it to be dead accurate in reporting hence it's the first and the only False Positive Free web application security scanner.