[原文]SQL injection vulnerability in index.php in pdjk-support suite 1.1a and earlier allows remote attackers to execute arbitrary SQL commands via the (1) rowstart, (2) news_id, and (3) faq_id parameters.
Pdjk-support Suite index.php Multiple Parameter SQL Injection
Remote / Network Access
Loss of Confidentiality,
Loss of Integrity
Pdjk-support Suite contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the index.php script not properly sanitizing user-supplied input to the 'rowstart', 'news_id' and 'faq_id' variables. This may allow an attacker to inject or manipulate SQL queries in the back-end database.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.