source: https://www.securityfocus.com/bid/22142/info
Easebay Resources Login Manager is prone to multiple input-validation vulnerabilities because the application fails to sufficiently sanitize user-supplied input. The vulnerabilities include an SQL-injection issue and a cross-site scripting issue.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, retrieve sensitive information, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
To exploit a cross-site scripting issue:
An attacker can exploit this issue by enticing an unsuspecting user into following a malicious URI.
An example URI has been provided:
http://www.example.com/path/admin/memberlist.php?keyword=[XSS]&type=1&status=1&by=1&sbmt1=++Search++&accessname=0&init_row=0&sort=create_time&sq=desc
To exploit an SQL-injection issue:
An attacker can exploit this issue via a web client.
An example URI has been provided:
http://www.example.com/path/admin/memberlist.php?init_row=[SQL]