Closed ghost closed 6 years ago
Thank you for your concern on these vulnerabilities.
These vulnerabilities were corrected in Gazelle by WCD the day after they were originally reported: https://github.com/WhatCD/Gazelle/commit/133b188d6b68889b6ab17fc54e133fc39ef45a4c. This repo is based off the latest commit from that repo (we've unfortunately lost the history due to a ton of random/bad commits between then and when this repo started which made recovering the history and keeping my sanity impossible).
We've also begun (slowly) updating all queries within Gazelle to use prepared queries instead of how they're currently done which will mitigate the first attack vector used in that post elsewhere in the site.
So, for XSS script attack, any change are made?
Note: https://github.com/OPSnet/Gazelle/commit/4f79347dcd23e5ca55eb81192cbef7d6d06eb04c#diff-b3247aca37b3b4b88b81beb7d4e4fc08 contains a fix for a similar SQL injection where you could specify a level that escapes the query.
The XSS attacks were just against TBDev from that blog post, not against Gazelle.
Is these vulnerabilities already corrected?
https://www.acunetix.com/blog/news/critical-vulnerabilities-discovered-gazelle-tbdev-net/