|
Description
|
|
A vulnerability has been discovered in MangosWeb Enhanced, which can be exploited by malicious people to conduct SQL injection attacks.
Input passed via the "login" POST parameter to mangos/index.php (when "p" is set to "account", "sub" is set to "login", and "action" is set to "login") is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Successful exploitation requires that "magic_quotes_gpc" is disabled.
The vulnerability is confirmed in version 3.0.3. Other versions may also be affected.
|