source: https://www.securityfocus.com/bid/21516/info
ProNews is prone to multiple input-validation vulnerabilities, including multiple HTML-injection issues, an SQL-injection issue, and a cross-site scripting issue, because the application fails to sufficiently sanitize user-supplied input.
A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.
ProNews version 1.5 is vulnerable to these issues.
http://www.example.com/[script_news_path]/admin/change.php?pseudo=[XSS]&email=">[XSS]&date=[XSS]&sujet=[XSS]&message=[XSS]&site=">[XSS]<foo
&lien=[XSS]&aa=[existing_news_id]