header-logo
Suggest Exploit
vendor:
Password Protect
by:
7.5
CVSS
HIGH
Cross-Site Scripting (XSS) and SQL Injection
79, 89
CWE
Product Name: Password Protect
Affected Version From: All versions
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Password Protect Multiple Cross-Site Scripting and SQL Injection Vulnerabilities

The Password Protect application is prone to multiple cross-site scripting and SQL injection vulnerabilities. These vulnerabilities are caused by inadequate sanitization of user-supplied input. Successful exploitation of these vulnerabilities can allow arbitrary HTML and script code execution as well as compromise of the underlying database. Attackers can potentially gain unauthorized administrative access to the application.

Mitigation:

To mitigate these vulnerabilities, it is recommended to implement proper input validation and sanitization techniques. Additionally, using parameterized queries or prepared statements for database queries can help prevent SQL injection attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11073/info

Password Protect is reported prone to a multiple cross-site scripting and SQL injection vulnerabilities. These issues occur due to insufficient sanitization of user-supplied input. Successful exploitation of these issues may result in arbitrary HTML and script code execution and/or compromise of the underlying database.

It is reported that these issues could be exploited to gain unauthorized administrative access to the application.

All versions of Password Protect are considered vulnerable to these issues. 

SQL injection

/adminSection/index_next.asp?admin = (SQLInjection) Pass = (SQLInjection)

/adminSection/ChangePassword.asp?LoginId=(SQLInjection) OPass=(SQLInjection) NPass=(SQLInjection) CPass=(SQLInjection)

Cross-site scripting:
/adminSection/index.asp?ShowMsg=(XSS)
/adminSection/ChangePassword.asp?ShowMsg=(XSS)
/adminSection/users_list.asp?ShowMsg=(XSS)
/adminSection/users_add.asp?ShowMsg=(XSS)