-
Notifications
You must be signed in to change notification settings - Fork 362
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
xss_3 #131
Comments
Same as my comment submitted two instances ago; as an old timer who began in gazelle, codeigniter and laravel I applaud your analysis and disclosure. |
This one is of low importance. User would have to have users_mod permission to access this. I did circumvent this: This is very simple. A proper regex implementation would further insure proper validation.
|
I agree with you if we evaluate the vulnerability based on CVSS (https://www.first.org/cvss), since PR would be equal to Low. But note that XSS has an impact because the attacker, with a click from a moderator, could perform any action by the moderator. So, if this attack is targeted, it has a relevant impact. |
Hello,
I would like to report for a XSS vulnerability in gazelle commit 63b3370
In file https://github.com/WhatCD/Gazelle/blob/master/sections/tools/managers/multiple_freeleech.php
Source from
$_POST['torrents']
without any filtering or checking which resulting in XSS.Poc
POST /sections/tools/managers/multiple_freeleech.php
With the Data
torrents=</textarea>%3Cscript%3Ealert(1);%3C/script%3E<textarea>
Manual verification
BTW,cms.gazelle.com in local(changes hosts)
The text was updated successfully, but these errors were encountered: