header-logo
Suggest Exploit
vendor:
slickMsg
by:
Unknown
5.5
CVSS
MEDIUM
Cross-Site Scripting (XSS), HTML-Injection
79
CWE
Product Name: slickMsg
Affected Version From: 0.7-alpha
Affected Version To: 0.7-alpha
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2010

slickMsg Cross-Site Scripting and HTML-Injection Vulnerabilities

slickMsg is prone to a cross-site scripting vulnerability and multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

Mitigation:

It is recommended to sanitize and validate user-supplied input before using it in dynamically generated content. Input filtering and output encoding can help prevent XSS and HTML-injection attacks. Regular security updates and patches should be applied to the software to mitigate these vulnerabilities.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/45403/info

slickMsg is prone to a cross-site scripting vulnerability and multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

slickMsg 0.7-alpha is vulnerable; other versions may also be affected. 

XSS example 1: [size=expression(alert(123))]size[/size]
XSS example 2: [color=expression(alert(456))]blue[/color]
http://www.example.com/vulns/161/exploit.html