Billwerx RC v3.1 Multiple Vulnerabilities
A regular employee can embed javascript code that could be executed within the context of the admin's browser. If the user edits their own profile by going to 'http://[server]/billwerx_public_beta/employees/update_employee.php?employee_id=2' and places '<script>alert(document.cookie)</script>' into any of the following fields: 'firstname', 'billing address', 'billing city', 'billing province', 'billing postal', 'billing country' and then gives the following link to the admin: http://[server]/billwerx_public_beta/employees/update_employee.php?employee_id=2 The user could potentially log the admins cookie and reset their own session thus gaining administration access. For SQL Injection, the description post value is unsanitized and can be exploited using ','1'); DELETE FROM credit_cards;/* or ','1'); insert into employees (username, password, firstname, lastname, email, admin) values ('hacker','hacker','hacker','hacker','hacker@hacker.com','1');/*