GDL 'id' Parameter SQL Injection Vulnerability

Summary
GDL (Ganesha Digital Library) is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. GDL 4.2 is vulnerable other versions may also be affected.
Solution
Reports indicate that this issue has been fixed by the vendor but Symantec has not confirmed it. Please contact the vendor for more information.
References