PBBoard CMS 'email' Parameter SQL Injection Vulnerability

Summary
This host is installed with PBBoard CMS and is prone to sql-injection vulnerability.
Impact
Successful exploitation will allow attackers to inject or manipulate SQL queries in the back-end database allowing for the manipulation or disclosure of arbitrary data. Impact Level: Application
Solution
Update to latest PBBoard version 3.0.1 (updated on 28/11/2014) or later.
Insight
Input passed via the 'email' POST parameter to the /includes/functions.class.php script is not properly sanitized before returning to users.
Affected
PBBoard version 3.0.1 and prior.
Detection
Send a crafted request via HTTP GET and check whether it is able to execute sql query or not.
References