Name :  SQL Injection Vulnerability in glFusion
Software :  glFusion 1.3.0 and possibly below.
Vendor Homepage :
Vulnerability Type :  Blind SQL Injection
Severity :  Critical
Researcher :  Omar Kurt
Advisory Reference :  NS-13-009

A dynamic system based on flexible and granular permissions, with spam
protection, forums, file management, media gallery, calendars, polls,
site-wide search, RSS feeds, and more!

glFusion is affected by SQL Injection vulnerability in version 1.3.0.
Example PoC url is as follows:
Blind SQL Injection Vulnerability
POST - param:
cat_id='+(SELECT 1 FROM (SELECT SLEEP(25))A)+'

You can read the full article about SQL Injection vulnerabilities from here


Advisory Timeline
05/09/2013 - First contact: No response
05/09/2013 - Vendor replied
05/09/2013 - Shared details
06/09/2013 - Fix released
09/09/2013 - Advisory Released

It has been discovered on testing of Netsparker, Web Application Security
Scanner -

MSL Advisory Link :
Netsparker Advisories :

About Netsparker
Netsparker® can find and report security issues such as SQL Injection and
Cross-site Scripting (XSS) in all web applications regardless of the
platform and the technology they are built on. Netsparker's unique
detection and exploitation techniques allows it to be dead accurate in
reporting hence it's the first and the only False Positive Free web
application security scanner.
Netsparker Advisories, <>
Rate this post
Брой прочитания на тази страница: 1045
glFusion 1.3.0 (search.php, cat_id param) – SQL Injection
Tagged on:

Вашият коментар

Вашият имейл адрес няма да бъде публикуван. Задължителните полета са отбелязани с *