OPSnet / Gazelle

The Unlicense
340 stars 98 forks source link

Vulnerabilities in Gazelle and TBDEV.net - acunetix #61

Closed ghost closed 6 years ago

ghost commented 6 years ago

Is these vulnerabilities already corrected?

https://www.acunetix.com/blog/news/critical-vulnerabilities-discovered-gazelle-tbdev-net/

itismadness commented 6 years ago

Thank you for your concern on these vulnerabilities.

These vulnerabilities were corrected in Gazelle by WCD the day after they were originally reported: https://github.com/WhatCD/Gazelle/commit/133b188d6b68889b6ab17fc54e133fc39ef45a4c. This repo is based off the latest commit from that repo (we've unfortunately lost the history due to a ton of random/bad commits between then and when this repo started which made recovering the history and keeping my sanity impossible).

We've also begun (slowly) updating all queries within Gazelle to use prepared queries instead of how they're currently done which will mitigate the first attack vector used in that post elsewhere in the site.

ghost commented 6 years ago

So, for XSS script attack, any change are made?

itismadness commented 6 years ago

Note: https://github.com/OPSnet/Gazelle/commit/4f79347dcd23e5ca55eb81192cbef7d6d06eb04c#diff-b3247aca37b3b4b88b81beb7d4e4fc08 contains a fix for a similar SQL injection where you could specify a level that escapes the query.

The XSS attacks were just against TBDev from that blog post, not against Gazelle.