wizmall "BID" and "UID" SQL Injection Vulnerabilities
Description
Two vulnerabilities have been discovered in wizmall, which can be exploited by malicious people to conduct SQL injection attacks.
1) Input passed to the "BID" parameter in wizboard/skin/sandle_photo/print.php is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
2) Input passed to the "UID" parameter in wizboard/download.php is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerabilities are confirmed in version 6.4.3. Prior versions may also be affected.