[原文]Multiple SQL injection vulnerabilities in Pro Publish 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) email and (2) password parameter to (a) admin/login.php, (3) find_str parameter to (b) search.php, or (4) artid parameter to (c) art.php, or (5) catid parameter to (d) cat.php.
PHP Pro Publish admin/login.php Multiple Parameter SQL Injection
Remote / Network Access
Loss of Confidentiality,
Loss of Integrity
PHP Pro Publish contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'admin/login.php' script not properly sanitizing user-supplied input to the 'email' or 'password' variables. This may allow an attacker to inject or manipulate SQL queries in the back-end database.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.