SePortal poll.php SQL Injection Vulnerability

Summary
The host is running SePortal which is prone to SQL Injection Vulnerability.
Impact
Successful attack could lead to execution of arbitrary SQL queries. Impact Level: Application
Solution
Upgrade to SePortal Version 2.5 or later For updates refer to http://www.seportal.org/
Insight
Input passed to the poll_id parameter in poll.php and to sp_id parameter in staticpages.php files are not properly sanitised before being used in an SQL query.
Affected
SePortal Version 2.4 and prior on all running platform.
References

Updated on 2017-03-28