Product: Gazelle
Download: https://github.com/WhatCD/Gazelle
Vunlerable Version: latest version
Tested Version: latest version
Author: ADLab of Venustech
Advisory Details:
Multiple Cross-Site Scripting (XSS) were discovered in “Gazelle latest version”, which can be exploited to execute arbitrary code.
The vulnerabilities exist due to insufficient filtration of user-supplied data in multiple HTTP POST parameters passed to the “Gazelle-master/sections/tools/managers/multiple_freeleech.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
The exploitation examples below use the "alert()" JavaScript function to see a pop-up messagebox:
Poc:
(1)
Post: torrents=</textarea><script>alert(1);</script><textarea>
To http://localhost/.../Gazelle-master/sections/tools/managers/multiple_freeleech.php
(2)
Post: size= " /><script>alert(1);</script><input text="type
To http://localhost/.../Gazelle-master/sections/tools/managers/multiple_freeleech.php
The text was updated successfully, but these errors were encountered:
Product: Gazelle
Download: https://github.com/WhatCD/Gazelle
Vunlerable Version: latest version
Tested Version: latest version
Author: ADLab of Venustech
Advisory Details:
Multiple Cross-Site Scripting (XSS) were discovered in “Gazelle latest version”, which can be exploited to execute arbitrary code.
The vulnerabilities exist due to insufficient filtration of user-supplied data in multiple HTTP POST parameters passed to the “Gazelle-master/sections/tools/managers/multiple_freeleech.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
The exploitation examples below use the "alert()" JavaScript function to see a pop-up messagebox:
Poc:
(1)
Post: torrents=</textarea><script>alert(1);</script><textarea>
To
http://localhost/.../Gazelle-master/sections/tools/managers/multiple_freeleech.php
(2)
Post: size= " /><script>alert(1);</script><input text="type
To
http://localhost/.../Gazelle-master/sections/tools/managers/multiple_freeleech.php
The text was updated successfully, but these errors were encountered: