SimpleHRM 'username' Parameter SQL Injection Vulnerability

Summary
This host is installed with SimpleHRM and is prone to sql injection vulnerability.
Impact
Successful exploitation will allow attacker to manipulate SQL queries in the backend database allowing for the manipulation or disclosure of arbitrary data. Impact Level: Application
Solution
No solution or patch is available as of 20th February, 2015. Information regarding this issue will be updated once the solution details are available. For updates refer to http://www.simplehrm.com
Insight
Flaw is due to the /index.php/user/setLogin script not properly sanitizing user-supplied input to the 'username' parameter.
Affected
SimpleHRM version 2.3 and 2.2, Other versions may also be affected.
Detection
Send a crafted HTTP GET request and check whether it is able to execute sql query or not.
References