[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Rad User Manager XSS Vulnerabilities

Author
Valentin Hobel
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-12087
Category
web applications
Date add
01-05-2010
Platform
php
====================================
Rad User Manager XSS Vulnerabilities
====================================


[:::::::::::::::::::::::::::::::::::::: 0x1 ::::::::::::::::::::::::::::::::::::::]
>> General Information 
Advisory/Exploit Title = Rad User Manager XSS Vulnerabilities
Author = Valentin Hoebel
Contact = valentin@xenuser.org


[:::::::::::::::::::::::::::::::::::::: 0x2 ::::::::::::::::::::::::::::::::::::::]
>> Product information
Name = Rad User Manager
Vendor = Rad Inks
Vendor Websites = http://www.radinks.net/, http://www.radinks.com/
Affected Version(s) = 2.90

 
[:::::::::::::::::::::::::::::::::::::: 0x3 ::::::::::::::::::::::::::::::::::::::]
>> #1 Vulnerability
Type = XSS
Almost every parameter accepting user input is vulnerable. Examples:

members/login.php?username=[XSS]
members/signup.php?username=[XSS]
admin/userdetails.php?userId=[XSS]


[:::::::::::::::::::::::::::::::::::::: 0x4 ::::::::::::::::::::::::::::::::::::::]
>> Additional Information
Advisory/Exploit Published = 01.05.2010

When being installed, the Rad User Manager creates two accounts with default
passwords:

Login: "admin" Password: "radmin"
Login: "user" Password: "radmin"


[:::::::::::::::::::::::::::::::::::::: 0x5 ::::::::::::::::::::::::::::::::::::::]
>> Misc
Greetz && Thanks = inj3ct0r team, Exploit DB, hack0wn and ExpBase!
<3 packetstormsecurity.org!


[:::::::::::::::::::::::::::::::::::::: EOF ::::::::::::::::::::::::::::::::::::::]




#  0day.today [2024-12-26]  #