source: https://www.securityfocus.com/bid/16600/info Virtual Hosting Control System (VHCS) is prone to multiple input and access vulnerabilities. VHCS is prone to an HTML-injection vulnerability and an authentication-bypass vulnerability. These issues could be exploited to gain administrative access to the application; other attacks are also possible. VHCS (version <= 2.4.7.1) PoC.  By RoMaNSoFt
VHCS (version <= 2.4.7.1) PoC.  By RoMaNSoFt <roman@rs-labs.com>  [08.Feb.2006]

   
  Target URL
  Username  (should NOT exist)
  Exploit it!
 


Quick instructions.-

1.- Enable JavaScript. Fill in the form with appropiate target URL (usually you will only need to replace <target> string) and username.
2.- Remember not to use a probably existing username (such as "admin").
3.- Launch the exploit. If target system is vulnerable, a new VHCS admin user will be created ;-)
4.- You will be redirected to VHCS login page. Try to login with your brand new username.
5.- Ummm, I forgot it... The password is: dsrrocks.

More info (analysis, fix, etc).-

See RS-2006-1.