WhatCD / Gazelle

http://whatcd.github.io/Gazelle/
1.84k stars 364 forks source link

Gazelle – Cross-Site Scripting (XSS) in “multiple_freeleech.php” #114

Closed bestshow closed 7 years ago

bestshow commented 7 years ago

Product: Gazelle Download: https://github.com/WhatCD/Gazelle Vunlerable Version: latest version Tested Version: latest version Author: ADLab of Venustech

Advisory Details: Multiple Cross-Site Scripting (XSS) were discovered in “Gazelle latest version”, which can be exploited to execute arbitrary code. The vulnerabilities exist due to insufficient filtration of user-supplied data in multiple HTTP POST parameters passed to the “Gazelle-master/sections/tools/managers/multiple_freeleech.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. The exploitation examples below use the "alert()" JavaScript function to see a pop-up messagebox: Poc: (1) Post: torrents=