source: https://www.securityfocus.com/bid/54456/info Simple Machines is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected application, potentially allowing the attacker to steal cookie-based authentication credentials or control how the site is rendered to the user. Other attacks are also possible. Simple Machines Forum 2.0.2 is vulnerable; other versions may also be affected. Proof of Concept: ================= The persistent input validation vulnerability can be exploited by remote attacker with local low privileged user account & low required user inter action. For demonstration or reproduce ... Review: Package Manager > Download New Packages > FTP Information Required (Listing)
<[PERSISTENT SCRIPT CODE]' <"="" class="input_text"> ... or
<[PERSISTENT SCRIPT CODE])' <"="" style="width: 99%;" class="input_text">
URL: http://www.example.com/smf/index.php?action=admin;area=packages;sa=packageget;get;f5073d7837d8=5a2bdd540a245be265f26c102fff9626 Review: Smiley Sets > Add Akyhne's Set "><[PERSISTENT SCRIPT CODE]' <="" akyhne/... URL: http://www.example.com/smf/index.php?action=admin;area=smileys;sa=modifyset;set=2 Review: Newsletter > Add <[PERSISTENT SCRIPT CODE])' <"="">

URL: http://www.example.com/smf/index.php?action=admin;area=news;sa=mailingmembers;b74f235ec=2b30f2b9aad6e26815e1c18594922b37 Review: Edit Membergroups & User/Groups Listing

Edit Membergroup - "><[PERSISTENT SCRIPT CODE])' <"=""><[PERSISTENT SCRIPT CODE]) <" >
URL: http://www.example.com/smf/index.php?action=admin;area=membergroups;sa=index;b74f235ec=2b30f2b9aad6e26815e1c18594922b37 URL: http://www.example.com/smf/index.php?action=admin;area=membergroups;sa=add;b74f235ec=2b30f2b9aad6e26815e1c18594922b37