Paypal Subscription Manager Multiple HTML Injections

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Paypal Subscription Manager allows webmaster easily create subscription web site, visitors can access to digital product instantly after paying through Paypal, PSM provides ability to effortlessly process subscription and protect membership areas. PSM uses PHP and MySQL for fast, efficient, professional processing. An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.



Hackers Center Security Group (http://www.hackerscenter.com)

Credit: Doz
Risk: Medium


Class: Input Validation Error
Remote: No
Local: Yes - Admin Panel


Version: Paypal Subscription Manager
Vendor: www.easebayresources.com


Online Demo: http://www.easebayresources.com/demo.html
support@xxxxxxxxxxxxxxxxxxxx 


Attackers can exploit these issues via a web client.


SQL:

http://www.Site.com/psm/admin/memberlist.php?keyword=[SQl]&p=a&by=1&sbmt1=++Search++&init_row=0&sort=create_time&sq=desc&status=1


XSS:

http://www.Site.com/psm/admin/edit_member.php?username=Admin=[XSS]


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux