Foojan PHP Weblog suffers from an injection flaw when trusting an unsanitized HTTP_REFERER payload.
75439af3343c01b0d18d2043b57904f86045439a6c31fb9d2d7216e6b5ffbe31
Vendor : https://foojan.soltoononline.com
A complete Persian PHP Weblog (WMS)
Example Information Disclosure:
https://[target]/[foojan]/adminmodules/daylinks/index.php
https://[target]/[foojan]/index.php?daylinkspage=-1
Refferer Html Injection
Where : in gmain.php
$Weblog-> query ("INSERT INTO `visits` ( `id` , `ip` , `refferer` , `date` , `time` )
VALUES (
'', '".$_SERVER['HTTP_USER_AGENT']."', '".$_SERVER['HTTP_REFERER']."', '$num', '$num2'
);");
So Attacker Can Inject HTML code in refferer field with HTTP HEADER and it will be executed in the index.php and admin.php .