A vulnerability has been discovered in XRay CMS, which can be exploited by malicious people to conduct SQL injection attacks.
Input passed via the "username" parameter to data/login2.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
NOTE: This can further be exploited to bypass the authentication mechanism.
Successful exploitation of this vulnerability requires that "magic_quotes_gpc" is disabled.
The vulnerability is confirmed in version 1.1.1. Other versions may also be affected.
Vulnerable Products
Vulnerable Software: XRay CMS 1.x
Solution
Edit the source code to ensure that input is properly sanitised.