slickMsg - Cross-Site Scripting / HTML Injection

Author: Aliaksandr Hartsuyeu
type: webapps
platform: php
port: 
date_added: 2010-12-15  
date_updated: 2014-10-29  
verified: 1  
codes:   
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 35111.txt  
source: https://www.securityfocus.com/bid/45403/info

slickMsg is prone to a cross-site scripting vulnerability and multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

slickMsg 0.7-alpha is vulnerable; other versions may also be affected.

XSS example 1: [size=expression(alert(123))]size[/size]
XSS example 2: [color=expression(alert(456))]blue[/color]
http://www.example.com/vulns/161/exploit.html