Glossword contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the gw_admin/login.php script not properly sanitizing user-supplied input to the 'arPost[user_name]' parameter. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.
Disclosure Timeline:
Disclosure Date :2013-02-05
Exploit Publish Date :2013-02-05