header-logo
Suggest Exploit
vendor:
MKPortal
by:
SecurityFocus
8.8
CVSS
HIGH
HTML-injection
79
CWE
Product Name: MKPortal
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

MKPortal HTML-injection Vulnerability

MKPortal is vulnerable to HTML-injection due to insufficient sanitization of user-supplied data. Attacker-supplied HTML or JavaScript code can be executed in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user. The example data provided shows that the application fails to properly validate user-supplied input, allowing attackers to inject malicious HTML or JavaScript code.

Mitigation:

Input validation should be used to ensure that user-supplied data is properly sanitized.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/36218/info

MKPortal is prone to multiple HTML-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data.

Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user; other attacks are also possible. 

The following example data is available:

[UttpRL=htttptp://example.com]example.com[/URL]
[IMttpG]htttptps://example.com/image.php?i=1&dateline=[/IMG]