The exploit demonstrates SQL injection and XSS vulnerabilities in 2Moons CMS via the `externalAuth[method]` parameter in the registration process. It also highlights an arbitrary file download issue due to leftover installation files.
Classification
Working Poc 95%
Attack Type
Sqli | Xss | Info Leak
Complexity
Trivial
Reliability
Reliable
Target:2Moons CMS (all versions as of 2015)
No auth needed
Prerequisites:Access to the registration page · Network connectivity to the target