[+] Exploit Title ; Persian Link cms Stored xss vulnerability
[+] Date : 2018-01-30
[+] Author : 0P3N3R From IRANIAN ETHICAL HACKERS
[+] Version : 2.1
[+] Vendor Homepage : http://mahdiy.ir/
[+] Dork : intext:" Powered By Persian Link CMS - Design By MahdiY "
[+] Forum : irethicalhackers.com/forums
[+] Tested On : windows 10 - kali linux 2.0
[+] Contact : https://telegram.me/WebServer
[+] Description :
[!] persian link cms Is a link box And Users can submit any sites link
[+] Poc :
[+] Stored XSS Vulnerability :
[!] Go to submit new link And insert payload on link title and link description.
[!] now if admin go to the admin panel , he see your payload alert
[*] Payload : <script>alert('0P3N3R')</script>
[+] Security Level :
[!] medium
[+] Exploitation Technique:
[!] Remote
[+] Vulnerability Files :
[*] send.php
[+] Fix :
[!] Restrict user input or replace bad characters or use htmlspecialchars and htmlentities
[+] Target :
[!] http://mordegan.ir/link-6.html
[!] http://ecoto.ir/web/
[!] http://myrss.hol.es/
[!] http://linkdoni.mehrresane.ir/
[+] We Are : [+] 0P3N3R [+] Mehrdad_Ice [+] BaxTurk24 [+] S0hp [+] ERROR1067