[原文]Multiple SQL injection vulnerabilities in 4images 1.7.1 and earlier allow remote attackers to execute arbitrary SQL commands via the sessionid parameter in (1) top.php and (2) member.php. NOTE: this issue has also been reported to affect 1.7.2.
4images contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'top.php' script not properly sanitizing user-supplied input to the 'sessionid' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database.
Upgrade to version 1.7.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.