← Advisories

Gnew v2013.1 Multiple XSS And SQL Injection Vulnerabilities

Medium
Advisory ID
ZSL-2013-5153
Release Date
11 August 2013
Vendor
Raoul Proença - http://www.gnew.fr
Affected Version
2013.1
Tested On
Microsoft Windows 7 Ultimate SP1 (EN), Apache 2.4.2 (Win32), PHP 5.4.7, MySQL 5.5.25a
Summary

Gnew is a simple Content Management System written with PHP language and using a database server (MySQL, PostgreSQL or SQLite) for storage.

Description

Input passed via several parameters is not properly sanitised before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and HTML/script code in a user's browser session in context of an affected site.

Proof of Concept
Disclosure Timeline
09.01.2016Vendor released version 2016.1 to address these issues.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
11.08.2013Initial release
12.08.2013Added reference [2], [3], [4] and [5]
15.08.2013Added reference [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18] and [19]
04.03.2014Added reference [20]
14.01.2016Added Vendor Status and reference [21]