TGS Content Management System contains a flaw that may allow a remote attacker to carry out an SQL injection attack. The issue is due to the 'cms/frontpage_ception.php' script not properly sanitizing user-supplied input to the 'cmd', 's_dir', 'minutes', 's_mask', 'test3_mp', 'test15_file1', 'submit', 'brute_method', ftp_server_port', 'userfile14', 'subj', 'mysql_l', 'action', and 'userfile1' parameter. This may allow a remote attacker to inject or manipulate SQL queries in the back-end database.
Remote / Network Access
Loss of Confidentiality,
Loss of Integrity
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.