Easebay Resources Login Manager - Multiple Input Validation Vulnerabilities
Author: Doz
type: webapps
platform: php
port:
date_added: 2007-01-20
date_updated: 2013-11-08
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/22142/info
Easebay Resources Login Manager is prone to multiple input-validation vulnerabilities because the application fails to sufficiently sanitize user-supplied input. The vulnerabilities include an SQL-injection issue and a cross-site scripting issue.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, retrieve sensitive information, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
To exploit a cross-site scripting issue:
An attacker can exploit this issue by enticing an unsuspecting user into following a malicious URI.
An example URI has been provided:
http://www.example.com/path/admin/memberlist.php?keyword=[XSS]&type=1&status=1&by=1&sbmt1=++Search++&accessname=0&init_row=0&sort=create_time&sq=desc
To exploit an SQL-injection issue:
An attacker can exploit this issue via a web client.
An example URI has been provided:
http://www.example.com/path/admin/memberlist.php?init_row=[SQL]