post - Non-persistent XSS in slickMsg

Summary

Vulnerability
post - Non-persistent XSS in slickMsg
Discovered
2010.12.02
Last Update
n/a n/a
ID
EV0161
CVE
n/a
Risk Level
low
Type
Cross Site Scripting
Status
Unpatched. Vendor notified. No reply from developer(s).
Vendor
n/a
Vulnerable Software
slickMsg (http://slickmsg.sourceforge.net/)
Version
0.7-alpha
PoC/Exploit
Available
Solution
Not available
Discovered by
Aliaksandr Hartsuyeu (eVuln.com)

Description

Cross Site Scripting found in slickMsg (http://slickmsg.sourceforge.net/) script.

Non-persistent XSS
It is possible to inject xss code into post parameter in views/Post/edit/form.php script.

Parameter post is not properly sanitized before being used in HTML code.

Condition: register_globals: on

PoC/Exploit

Non-persistent XSS Example.

XSS example: http://test-website/slickmsg/views/Post/edit/form.php?post=</textarea><script>alert('XSS')</script>

Solution.

Solution for "post - Non-persistent XSS in slickMsg" is not available. Check vendor's website for updates.