DaloRADIUS Web Management Multiple Vulnerabilities

Summary
This host is installed with DaloRADIUS Web Management and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attacker to execute arbitrary HTML or web script in a user's browser session in context of an affected site, compromise the application and access or modify data in the database. Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
- The acct-ipaddress.php script not properly sanitizing user-supplied input to the 'orderBy' and 'ipaddress' parameters. - The application does not require multiple steps or explicit confirmation for sensitive transactions. - The application does not validate the 'username' parameter upon submission to the mng-search.php script and does 'daloradiusFilter' parameter upon submission to the rep-logs-daloradius.php script.
Affected
DaloRADIUS version 0.9.9 and prior
References