mr_me has discovered multiple vulnerabilities in PHP Inventory, which can be exploited by malicious users and by malicious people to conduct SQL injection attacks.
1) Input passed via the "user_id" parameter to index.php (when "sub" is set to "users" and "action" is set to "details") and via the "sup_id" parameter (when "sub" is set to "suppliers" and "action" is set to "details") is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Successful exploitation of this vulnerability requires the attacker to be logged in to the application.
2) Input passed via the "user" and "pass" form field to index.php is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Successful exploitation requires that "magic_quotes_gpc" is disabled.
The vulnerabilities are confirmed in version 1.3.1. Other versions may also be affected.
Vulnerable Products
Vulnerable Software: PHP Inventory 1.x
Solution
Update to version 1.3.2 which fixes vulnerability #2. Edit the source code to ensure that input is properly sanitised.