Diesel Job Site 1.4 Multiple Vulnerabilities
The Diesel Job Site 1.4 is vulnerable to XSS, RFI, Admin Bypass, and Bypass Settings. An attacker can exploit these vulnerabilities by sending a malicious payload to the vulnerable parameters in the URL. For example, in the XSS vulnerability, an attacker can send a malicious script in the 'uname' and 'ename' parameters of the URL. For the RFI vulnerability, an attacker can send a malicious payload in the '_COOKIE[lang]' parameter of the URL. For the Admin Bypass vulnerability, an attacker can edit the email for the admin and search for the admin name, then submit the malicious payload in the 'forgot.php' page. Finally, for the Bypass Settings vulnerability, an attacker can send a malicious payload in the 'editsettings.php' page.