exploit-db-mirror/exploits/php/webapps/29498.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

21 lines
No EOL
1.1 KiB
Text

source: https://www.securityfocus.com/bid/22142/info
Easebay Resources Login Manager is prone to multiple input-validation vulnerabilities because the application fails to sufficiently sanitize user-supplied input. The vulnerabilities include an SQL-injection issue and a cross-site scripting issue.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, retrieve sensitive information, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
To exploit a cross-site scripting issue:
An attacker can exploit this issue by enticing an unsuspecting user into following a malicious URI.
An example URI has been provided:
http://www.example.com/path/admin/memberlist.php?keyword=[XSS]&type=1&status=1&by=1&sbmt1=++Search++&accessname=0&init_row=0&sort=create_time&sq=desc
To exploit an SQL-injection issue:
An attacker can exploit this issue via a web client.
An example URI has been provided:
http://www.example.com/path/admin/memberlist.php?init_row=[SQL]