Stefan Schurtz has discovered a vulnerability in Seotoaster, which can be exploited by malicious people to conduct SQL injection attacks.
Input passed via the "login" parameter to sys/login/index or the "memberLoginName" parameter to sys/login/member is not properly sanitised in the "selectUserIdByLoginPass()" function in seotoaster_core/application/models/LoginModel.php before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Note: This can further be exploited to bypass the authentication mechanism.
Successful exploitation requires that "magic_quotes_gpc" is disabled.
The vulnerability is confirmed in version 1.9. Other versions may also be affected.
Vulnerable Products
Vulnerable Software: Seotoaster 1.x
Solution
The vendor has released an updated version 1.9 on December 15th 2011.