OpenX contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the /www/admin/campaign-zone-link.php script not properly sanitizing user-supplied input to the 'ids' parameter. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.
Remote / Network Access
Loss of Integrity
Patch / RCS
Currently, there are no known workarounds or upgrades to correct this issue. However, a patch has been committed to the SVN repository in revision 81823 that addresses this vulnerability. Until it is incorporated into the next release of the software, manually patching an existing installation is the only known available solution. Check the vendor advisory or solution URL in the references section.