Paypal Subscription Manager Multiple HTML Injections

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1053060 漏洞类型
发布时间 2007-01-23 更新时间 2007-01-23
CVE编号 CVE-2007-0403
CVE-2007-0402
CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2007010083
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
Paypal Subscription Manager allows webmaster easily create subscription web site, visitors can access to digital product instantly after paying through Paypal, PSM provides ability to effortlessly process subscription and protect membership areas. PSM uses PHP and MySQL for fast, efficient, professional processing. An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

Hackers Center Security Group (http://www.hackerscenter.com)

Credit: Doz
Risk: Medium

Class: Input Validation Error
Remote: No
Local: Yes - Admin Panel

Version: Paypal Subscription Manager
Vendor: www.easebayresources.com

Online Demo: http://www.easebayresources.com/demo.html
support (at) easebayresources (dot) com [email concealed]

Attackers can exploit these issues via a web client.

SQL:

http://www.Site.com/psm/admin/memberlist.php?keyword=[SQl]&p=a&by=1&sbmt
1=++Search++&init_row=0&sort=create_time&sq=desc&status=1

XSS:

http://www.Site.com/psm/admin/edit_member.php?username=Admin=[XSS]