SweetRice contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'index.php' script not properly sanitizing user-supplied input to the 'file_name' parameter (when "action" is set to "attachment"), to the 'post' parameter (when "action" is set to "show_comment") and to the 'sys-name' parameter (when "action" is set to "view"). This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.
Remote / Network Access
Loss of Confidentiality,
Loss of Integrity
Upgrade to version 0.6.7.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.