<<< Date Index >>>     <<< Thread Index >>>

Paypal Subscription Manager Multiple HTML Injections



Paypal Subscription Manager allows webmaster easily create subscription web 
site, visitors can access to digital product instantly after paying through 
Paypal, PSM provides ability to effortlessly process subscription and protect 
membership areas. PSM uses PHP and MySQL for fast, efficient, professional 
processing. An attacker may leverage this issue to have arbitrary script code 
execute in the browser of an unsuspecting user in the context of the affected 
site. This may help the attacker steal cookie-based authentication credentials 
and launch other attacks. A successful exploit could allow an attacker to 
compromise the application, access or modify data, or exploit vulnerabilities 
in the underlying database implementation.



Hackers Center Security Group (http://www.hackerscenter.com)

Credit: Doz
Risk: Medium


Class: Input Validation Error
Remote: No
Local: Yes - Admin Panel


Version: Paypal Subscription Manager
Vendor: www.easebayresources.com


Online Demo: http://www.easebayresources.com/demo.html
support@xxxxxxxxxxxxxxxxxxxx 


Attackers can exploit these issues via a web client.


SQL:

http://www.Site.com/psm/admin/memberlist.php?keyword=[SQl]&p=a&by=1&sbmt1=++Search++&init_row=0&sort=create_time&sq=desc&status=1


XSS:

http://www.Site.com/psm/admin/edit_member.php?username=Admin=[XSS]