exploit-db-mirror/platforms/php/webapps/35111.txt
Offensive Security 63315eaa60 Updated 10_31_2014
2014-10-31 04:45:16 +00:00

11 lines
794 B
Text
Executable file

source: http://www.securityfocus.com/bid/45403/info
slickMsg is prone to a cross-site scripting vulnerability and multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
slickMsg 0.7-alpha is vulnerable; other versions may also be affected.
XSS example 1: [size=expression(alert(123))]size[/size]
XSS example 2: [color=expression(alert(456))]blue[/color]
http://www.example.com/vulns/161/exploit.html