Redaxscript Path Disclosure and SQL Injection Vulnerabilities

Summary
This host is running Redaxscript is prone to path disclosure and SQL injection vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary queries to the database, compromise the application, access or modify sensitive data, or exploit various vulnerabilities in the underlying SQL database. Impact Level: Application.
Solution
Upgrade to Redaxscript version 0.3.2a or later. For updates refer to http://redaxscript.com/download
Insight
The flaws are due to - Error in the '/templates/default/index.php', which reveals the full path of the script. - Input passed to the 'id' and 'password' parameters in '/includes/password.php' is not properly sanitised before being returned to the user.
Affected
Redaxscript version 0.3.2
References