header-logo
Suggest Exploit
vendor:
Easebay Resources Login Manager
by:
7.5
CVSS
HIGH
Input-Validation
79, 89
CWE
Product Name: Easebay Resources Login Manager
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Easebay Resources Login Manager Input-Validation Vulnerabilities

The Easebay Resources Login Manager application is prone to multiple input-validation vulnerabilities, including an SQL-injection issue and a cross-site scripting issue. These vulnerabilities can be exploited to steal authentication credentials, compromise the application, retrieve sensitive information, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Mitigation:

To mitigate these vulnerabilities, it is recommended to implement proper input validation and sanitization techniques. Additionally, the use of prepared statements or parameterized queries can help prevent SQL injection attacks. Regular security testing and code reviews should also be performed.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/22142/info

Easebay Resources Login Manager is prone to multiple input-validation vulnerabilities because the application fails to sufficiently sanitize user-supplied input. The vulnerabilities include an SQL-injection issue and a cross-site scripting issue.

Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, retrieve sensitive information, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

To exploit a cross-site scripting issue:

An attacker can exploit this issue by enticing an unsuspecting user into following a malicious URI.

An example URI has been provided:

http://www.example.com/path/admin/memberlist.php?keyword=[XSS]&type=1&status=1&by=1&sbmt1=++Search++&accessname=0&init_row=0&sort=create_time&sq=desc

To exploit an SQL-injection issue:

An attacker can exploit this issue via a web client.

An example URI has been provided:

http://www.example.com/path/admin/memberlist.php?init_row=[SQL]