Paypal Subscription Manager Multiple HTML Injections
Paypal Subscription Manager allows webmaster easily create subscription web
site, visitors can access to digital product instantly after paying through
Paypal, PSM provides ability to effortlessly process subscription and protect
membership areas. PSM uses PHP and MySQL for fast, efficient, professional
processing. An attacker may leverage this issue to have arbitrary script code
execute in the browser of an unsuspecting user in the context of the affected
site. This may help the attacker steal cookie-based authentication credentials
and launch other attacks. A successful exploit could allow an attacker to
compromise the application, access or modify data, or exploit vulnerabilities
in the underlying database implementation.
Hackers Center Security Group (http://www.hackerscenter.com)
Credit: Doz
Risk: Medium
Class: Input Validation Error
Remote: No
Local: Yes - Admin Panel
Version: Paypal Subscription Manager
Vendor: www.easebayresources.com
Online Demo: http://www.easebayresources.com/demo.html
support@xxxxxxxxxxxxxxxxxxxx
Attackers can exploit these issues via a web client.
SQL:
http://www.Site.com/psm/admin/memberlist.php?keyword=[SQl]&p=a&by=1&sbmt1=++Search++&init_row=0&sort=create_time&sq=desc&status=1
XSS:
http://www.Site.com/psm/admin/edit_member.php?username=Admin=[XSS]