source: http://www.securityfocus.com/bid/36392/info

Planet is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in dynamically generated content.

Attacker-supplied HTML and script code would run in the context of the affected website, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user.

Planet 2.0 is affected; other versions may also be vulnerable.

The following example code is available:

<img src="javascript:alert(1);" >