mojoportal Multiple Remote Vulnerabilities
With This vulnerability you can feed the malicious link to Admin of site (when he is already logged in) to move a file with Administrator Privilege. In this path you can find a method that move files to any path: http://Example.com/Services/FileService.ashx. With this command we can move user.config file to user.config.aaa: http://Example.com/Services/FileService.ashx?cmd=movefile&srcPath=./../../../user.config&destPath=./../../../user.config.aaa and then we can download it from URL: http://Example.com/user.config.aaa. This vulnerability can be exploited by an attacker to inject malicious script code in the application. The attacker can inject malicious script code in the application by using the 'Name' parameter in the 'Add New User' page.