SMW+ 1.5.6 - 'target' HTML Injection

Author: sonyy
type: webapps
platform: php
port: 
date_added: 2012-02-13  
date_updated: 2015-04-15  
verified: 1  
codes:   
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 36764.txt  
source: https://www.securityfocus.com/bid/51980/info

SMW+ is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input.

Attacker-supplied HTML and script code can run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or control how the site is rendered to the user. Other attacks are also possible.

SMW+ 1.5.6 is vulnerable; other versions may also be affected.

http://www.example.com/index.php/Special:FormEdit?target=%27%3Balert%28String.fromCharCode%2888%2C83%2C83%29%29%2F%2F\%27%3Balert%28String.fromCharCode%2888%2C83%2C83%29%29%2F%2F&categories=Calendar+