[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070120072515.23588.qmail@securityfocus.com>
Date: 20 Jan 2007 07:25:15 -0000
From: DoZ@...kersCenter.com
To: bugtraq@...urityfocus.com
Subject: Paypal Subscription Manager Multiple HTML Injections
Paypal Subscription Manager allows webmaster easily create subscription web site, visitors can access to digital product instantly after paying through Paypal, PSM provides ability to effortlessly process subscription and protect membership areas. PSM uses PHP and MySQL for fast, efficient, professional processing. An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
Hackers Center Security Group (http://www.hackerscenter.com)
Credit: Doz
Risk: Medium
Class: Input Validation Error
Remote: No
Local: Yes - Admin Panel
Version: Paypal Subscription Manager
Vendor: www.easebayresources.com
Online Demo: http://www.easebayresources.com/demo.html
support@...ebayresources.com
Attackers can exploit these issues via a web client.
SQL:
http://www.Site.com/psm/admin/memberlist.php?keyword=[SQl]&p=a&by=1&sbmt1=++Search++&init_row=0&sort=create_time&sq=desc&status=1
XSS:
http://www.Site.com/psm/admin/edit_member.php?username=Admin=[XSS]
Powered by blists - more mailing lists